OpenSSL 代码问题漏洞
CNNVD-ID编号 | CNNVD-202012-579 | CVE编号 | CVE-2020-1971 |
发布时间 | 2020-12-08 | 更新时间 | 2021-01-21 |
漏洞类型 | 代码问题 | 漏洞来源 | N/A |
危险等级 | 中危 | 威胁类型 | 远程 |
厂商 | N/A |
漏洞介绍
OpenSSL是Openssl团队的一个开源的能够实现安全套接层(SSLv2/v3)和安全传输层(TLSv1)协议的通用加密库。该产品支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。
OpenSSL 1.1.1版本和1.0.2版本存在代码问题漏洞,该漏洞源于空指针解引用和崩溃可能会导致拒绝服务攻击。
漏洞补丁
目前厂商已发布升级了OpenSSL 代码问题漏洞的补丁,OpenSSL 代码问题漏洞的补丁获取链接:
https://www.openssl.org/news/secadv/20201208.txt
参考网址
来源:CONFIRM
链接:https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676
来源:DEBIAN
链接:https://www.debian.org/security/2020/dsa-4807
来源:FREEBSD
链接:https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc
来源:CONFIRM
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html
来源:MISC
链接:https://www.oracle.com/security-alerts/cpujan2021.html
来源:FEDORA
来源:CONFIRM
链接:https://www.tenable.com/security/tns-2020-11
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html
来源:FEDORA
来源:GENTOO
链接:https://security.gentoo.org/glsa/202012-13
来源:MLIST
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20201218-0005/
来源:CONFIRM
来源:CONFIRM
链接:https://www.openssl.org/news/secadv/20201208.txt
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160961/Red-Hat-Security-Advisory-2021-0146-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160523/Red-Hat-Security-Advisory-2020-5476-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4426.3/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4365/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4385/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160414/Ubuntu-Security-Notice-USN-4662-1.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160499/Red-Hat-Security-Advisory-2020-5422-01.html
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-z-tpf-is-affected-by-an-openssl-vulnerability/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160605/Red-Hat-Security-Advisory-2020-5623-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0111/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0212/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-openssl-for-ibm-i-is-affected-by-cve-2020-1971/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160882/Red-Hat-Security-Advisory-2021-0056-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4394/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160916/Red-Hat-Security-Advisory-2021-0083-01.html
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpujan2021.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4426.2/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-1971
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4320/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160410/OpenSSL-Toolkit-1.1.1i.html
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2020-1971
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0184/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4514/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160704/Gentoo-Linux-Security-Advisory-202012-13.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0099/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0233/
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/OpenSSL-NULL-pointer-dereference-via-GENERAL-NAME-cmp-34055
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160636/Red-Hat-Security-Advisory-2020-5637-01.html
受影响实体
暂无
信息来源
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202012-579

评论