Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTJyY20tcGhjOS0zOTQ1
Pyopenssl Incorrect Memory Management
It was discovered that pyOpenSSL incorrectly handled memory when performing operations on a PKCS #12 store. A remote attacker could possibly use this issue to cause pyOpenSSL to consume resources, resulting in a denial of service.
This attack appear to be exploitable via Depends upon calling application, however it could be as simple as initiating a TLS connection that would cause the calling application to reload certificates from a PKCS #12 store. This vulnerability appears to have been fixed in 17.5.0.
Permalink: https://github.com/advisories/GHSA-2rcm-phc9-3945JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTJyY20tcGhjOS0zOTQ1
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 6 years ago
Updated: about 1 month ago
CVSS Score: 5.9
CVSS vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Identifiers: GHSA-2rcm-phc9-3945, CVE-2018-1000808
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-1000808
- https://github.com/pyca/pyopenssl/pull/723
- https://access.redhat.com/errata/RHSA-2019:0085
- https://github.com/advisories/GHSA-2rcm-phc9-3945
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00014.html
- https://github.com/pyca/pyopenssl/commit/e73818600065821d588af475b024f4eb518c3509
- https://github.com/pypa/advisory-database/tree/main/vulns/pyopenssl/PYSEC-2018-24.yaml
- https://usn.ubuntu.com/3813-1
Blast Radius: 24.3
Affected Packages
pypi:pyopenssl
Dependent packages: 417Dependent repositories: 13,020
Downloads: 106,895,109 last month
Affected Version Ranges: < 17.5.0
Fixed in: 17.5.0
All affected versions: 0.13.1, 0.15.1, 16.0.0, 16.1.0, 16.2.0, 17.0.0, 17.1.0, 17.2.0, 17.3.0, 17.4.0
All unaffected versions: 17.5.0, 18.0.0, 19.0.0, 19.1.0, 20.0.0, 20.0.1, 21.0.0, 22.0.0, 22.1.0, 23.0.0, 23.1.0, 23.1.1, 23.2.0, 23.3.0, 24.0.0, 24.1.0, 24.2.1, 24.3.0