BDU:2021-03037
Vulnerability from fstec - Published: 06.12.2017
VLAI Severity ?
Title
Уязвимость процедуры AVX2 Montgomery библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Description
Уязвимость процедуры AVX2 Montgomery библиотеки OpenSSL связана с недостатками защиты служебных данных. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, получить несанкционированный доступ к защищаемой информации с помощью закрытого ключа DH1024
Severity ?
Vendor
Oracle Corp., Red Hat Inc., Canonical Ltd., Сообщество свободного программного обеспечения, Node.js Foundation, IBM Corp., OpenSSL Software Foundation
Software Name
API Gateway, Transportation Management, Red Hat Enterprise Linux, Ubuntu, Debian GNU/Linux, Enterprise Manager Ops Center, JD Edwards EnterpriseOne Tools, Tuxedo, PeopleSoft Enterprise PeopleTools, Primavera P6 Enterprise Project Portfolio Management, Communications WebRTC Session Controller, Communications Application Session Controller, Communications Network Charging and Control, Agile Engineering Data Management, Secure Global Desktop, Enterprise Manager Base Platform, Endeca Server, Node.js, MySQL Connectors, Communications EAGLE LNP Application Processor, Communications Operations Monitor, Communications Session Border Controller, Communications Unified Session Manager, Enterprise Communications Broker, Enterprise Session Border Controller, JD Edwards World Security, MySQL Workbench, OSS Support Tools, Communications Diameter Signaling Router, MySQL Server, OpenSSL, Oracle Endeca Information Discovery Studio, MySQL Enterprise Monitor, Communications EAGLE Software
Software Version
11.1.2.4.0 (API Gateway), 6.2 (Transportation Management), 7 (Red Hat Enterprise Linux), 17.04 (Ubuntu), 9 (Debian GNU/Linux), 17.10 (Ubuntu), 12.2.2 (Enterprise Manager Ops Center), 12.3.3 (Enterprise Manager Ops Center), 9.2 (JD Edwards EnterpriseOne Tools), 12.1.1.0 (Tuxedo), 8.55 (PeopleSoft Enterprise PeopleTools), 8.56 (PeopleSoft Enterprise PeopleTools), 8.57 (PeopleSoft Enterprise PeopleTools), 8.4 (Primavera P6 Enterprise Project Portfolio Management), 15.1 (Primavera P6 Enterprise Project Portfolio Management), 15.2 (Primavera P6 Enterprise Project Portfolio Management), 16.1 (Primavera P6 Enterprise Project Portfolio Management), 16.2 (Primavera P6 Enterprise Project Portfolio Management), 18.8 (Primavera P6 Enterprise Project Portfolio Management), до 7.2 (Communications WebRTC Session Controller), 3.7.1 (Communications Application Session Controller), 3.8.0 (Communications Application Session Controller), 4.4.1.5.0 (Communications Network Charging and Control), 5.0.0.1.0 (Communications Network Charging and Control), 5.0.0.2.0 (Communications Network Charging and Control), 5.0.1.0.0 (Communications Network Charging and Control), 5.0.2.0.0 (Communications Network Charging and Control), 6.1.3 (Agile Engineering Data Management), 6.2.0 (Agile Engineering Data Management), 6.2.1 (Agile Engineering Data Management), 5.3 (Secure Global Desktop), 5.4 (Secure Global Desktop), 12.1.0.5 (Enterprise Manager Base Platform), 7.6.1 (Endeca Server), 7.7.0 (Endeca Server), 6 (Node.js), 8 (Node.js), от 17.7 до 17.12 включительно (Primavera P6 Enterprise Project Portfolio Management), до 5.3.10 включительно (MySQL Connectors), 10.0 (Communications EAGLE LNP Application Processor), 10.1 (Communications EAGLE LNP Application Processor), 10.2 (Communications EAGLE LNP Application Processor), 3.4 (Communications Operations Monitor), 4.0 (Communications Operations Monitor), SCz7.4.0 (Communications Session Border Controller), SCz7.4.1 (Communications Session Border Controller), SCz8.0.0 (Communications Session Border Controller), SCz8.1.0 (Communications Session Border Controller), SCz7.3.5 (Communications Unified Session Manager), PCz2.1 (Enterprise Communications Broker), PCz2.2 (Enterprise Communications Broker), PCz3.0 (Enterprise Communications Broker), ECz7.4.0 (Enterprise Session Border Controller), ECz7.5.0 (Enterprise Session Border Controller), ECz8.0.0 (Enterprise Session Border Controller), ECz8.1.0 (Enterprise Session Border Controller), A9.3 (JD Edwards World Security), A9.3.1 (JD Edwards World Security), A9.4 (JD Edwards World Security), до 8.0.13 включительно (MySQL Workbench), до 19.1 (OSS Support Tools), 8 (Debian GNU/Linux), 8.0 (Communications Diameter Signaling Router), 8.1 (Communications Diameter Signaling Router), 8.2 (Communications Diameter Signaling Router), 8.3 (Communications Diameter Signaling Router), 13.2.0.0 (Enterprise Manager Base Platform), 13.3.0.0 (Enterprise Manager Base Platform), до 5.6.40 включительно (MySQL Server), от 5.7.0 до 5.7.22 включительно (MySQL Server), от 8.0.0 до 8.0.11 включительно (MySQL Server), 16.04 ESM (Ubuntu), 4 (Node.js), 9 (Node.js), от 1.1.0 до 1.1.0h (OpenSSL), от 1.0.2 до 1.0.2n (OpenSSL), 7.6.1.0.0 (Oracle Endeca Information Discovery Studio), 7.7.0.0.0 (Oracle Endeca Information Discovery Studio), 8.54 (PeopleSoft Enterprise PeopleTools), до 3.3.7.3306 включительно (MySQL Enterprise Monitor), от 3.4.5 до 3.4.5.4248 включительно (MySQL Enterprise Monitor), от 4.0.2 до 4.0.2.5168 включительно (MySQL Enterprise Monitor), от 3.4.7 до 3.4.7.4297 включительно (MySQL Enterprise Monitor), от 4.0.4 до 4.0.4.5235 включительно (MySQL Enterprise Monitor), от 8.0.0 до 8.0.0.8131 включительно (MySQL Enterprise Monitor), до 8.0.13 включительно (MySQL Enterprise Monitor), до 4.0.7 включительно (MySQL Enterprise Monitor), от 8.0.0 до 8.0.11 включительно (MySQL Connectors), 46.5 (Communications EAGLE Software), 46.6 (Communications EAGLE Software), 46.7 (Communications EAGLE Software)
Possible Mitigations
Использование рекомендаций:
Для OpenSSL:
https://www.openssl.org/news/secadv/20171207.txt
https://www.openssl.org/news/secadv/20180327.txt
Для Node.js:
https://nodejs.org/en/blog/vulnerability/december-2017-security-releases/
Для Debian GNU/Linux:
https://www.debian.org/security/2017/dsa-4065
https://www.debian.org/security/2018/dsa-4157
Для программных продуктов Red Hat Inc.:
https://access.redhat.com/security/cve/cve-2017-3738
Для Ubuntu:
https://ubuntu.com/security/notices/USN-3512-1
Для программных продуктов Oracle Corp.:
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Reference
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/102118
http://www.securitytracker.com/id/1039978
https://access.redhat.com/errata/RHSA-2018:0998
https://access.redhat.com/errata/RHSA-2018:2185
https://access.redhat.com/errata/RHSA-2018:2186
https://access.redhat.com/errata/RHSA-2018:2187
https://github.com/openssl/openssl/commit/e502cc86df9dafded1694fceb3228ee34d11c11a
https://nodejs.org/en/blog/vulnerability/december-2017-security-releases/
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:12.openssl.asc
https://security.gentoo.org/glsa/201712-03
https://security.netapp.com/advisory/ntap-20171208-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03881en_us
https://www.debian.org/security/2017/dsa-4065
https://www.debian.org/security/2018/dsa-4157
https://www.openssl.org/news/secadv/20171207.txt
https://www.openssl.org/news/secadv/20180327.txt
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2017-16
https://www.tenable.com/security/tns-2018-04
https://www.tenable.com/security/tns-2018-06
https://www.tenable.com/security/tns-2018-07
https://nvd.nist.gov/vuln/detail/CVE-2017-3738
CWE
CWE-190, CWE-200
{
"CVSS 2.0": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS 3.0": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Oracle Corp., Red Hat Inc., Canonical Ltd., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Node.js Foundation, IBM Corp., OpenSSL Software Foundation",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "11.1.2.4.0 (API Gateway), 6.2 (Transportation Management), 7 (Red Hat Enterprise Linux), 17.04 (Ubuntu), 9 (Debian GNU/Linux), 17.10 (Ubuntu), 12.2.2 (Enterprise Manager Ops Center), 12.3.3 (Enterprise Manager Ops Center), 9.2 (JD Edwards EnterpriseOne Tools), 12.1.1.0 (Tuxedo), 8.55 (PeopleSoft Enterprise PeopleTools), 8.56 (PeopleSoft Enterprise PeopleTools), 8.57 (PeopleSoft Enterprise PeopleTools), 8.4 (Primavera P6 Enterprise Project Portfolio Management), 15.1 (Primavera P6 Enterprise Project Portfolio Management), 15.2 (Primavera P6 Enterprise Project Portfolio Management), 16.1 (Primavera P6 Enterprise Project Portfolio Management), 16.2 (Primavera P6 Enterprise Project Portfolio Management), 18.8 (Primavera P6 Enterprise Project Portfolio Management), \u0434\u043e 7.2 (Communications WebRTC Session Controller), 3.7.1 (Communications Application Session Controller), 3.8.0 (Communications Application Session Controller), 4.4.1.5.0 (Communications Network Charging and Control), 5.0.0.1.0 (Communications Network Charging and Control), 5.0.0.2.0 (Communications Network Charging and Control), 5.0.1.0.0 (Communications Network Charging and Control), 5.0.2.0.0 (Communications Network Charging and Control), 6.1.3 (Agile Engineering Data Management), 6.2.0 (Agile Engineering Data Management), 6.2.1 (Agile Engineering Data Management), 5.3 (Secure Global Desktop), 5.4 (Secure Global Desktop), 12.1.0.5 (Enterprise Manager Base Platform), 7.6.1 (Endeca Server), 7.7.0 (Endeca Server), 6 (Node.js), 8 (Node.js), \u043e\u0442 17.7 \u0434\u043e 17.12 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Primavera P6 Enterprise Project Portfolio Management), \u0434\u043e 5.3.10 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Connectors), 10.0 (Communications EAGLE LNP Application Processor), 10.1 (Communications EAGLE LNP Application Processor), 10.2 (Communications EAGLE LNP Application Processor), 3.4 (Communications Operations Monitor), 4.0 (Communications Operations Monitor), SCz7.4.0 (Communications Session Border Controller), SCz7.4.1 (Communications Session Border Controller), SCz8.0.0 (Communications Session Border Controller), SCz8.1.0 (Communications Session Border Controller), SCz7.3.5 (Communications Unified Session Manager), PCz2.1 (Enterprise Communications Broker), PCz2.2 (Enterprise Communications Broker), PCz3.0 (Enterprise Communications Broker), ECz7.4.0 (Enterprise Session Border Controller), ECz7.5.0 (Enterprise Session Border Controller), ECz8.0.0 (Enterprise Session Border Controller), ECz8.1.0 (Enterprise Session Border Controller), A9.3 (JD Edwards World Security), A9.3.1 (JD Edwards World Security), A9.4 (JD Edwards World Security), \u0434\u043e 8.0.13 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Workbench), \u0434\u043e 19.1 (OSS Support Tools), 8 (Debian GNU/Linux), 8.0 (Communications Diameter Signaling Router), 8.1 (Communications Diameter Signaling Router), 8.2 (Communications Diameter Signaling Router), 8.3 (Communications Diameter Signaling Router), 13.2.0.0 (Enterprise Manager Base Platform), 13.3.0.0 (Enterprise Manager Base Platform), \u0434\u043e 5.6.40 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Server), \u043e\u0442 5.7.0 \u0434\u043e 5.7.22 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Server), \u043e\u0442 8.0.0 \u0434\u043e 8.0.11 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Server), 16.04 ESM (Ubuntu), 4 (Node.js), 9 (Node.js), \u043e\u0442 1.1.0 \u0434\u043e 1.1.0h (OpenSSL), \u043e\u0442 1.0.2 \u0434\u043e 1.0.2n (OpenSSL), 7.6.1.0.0 (Oracle Endeca Information Discovery Studio), 7.7.0.0.0 (Oracle Endeca Information Discovery Studio), 8.54 (PeopleSoft Enterprise PeopleTools), \u0434\u043e 3.3.7.3306 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Enterprise Monitor), \u043e\u0442 3.4.5 \u0434\u043e 3.4.5.4248 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Enterprise Monitor), \u043e\u0442 4.0.2 \u0434\u043e 4.0.2.5168 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Enterprise Monitor), \u043e\u0442 3.4.7 \u0434\u043e 3.4.7.4297 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Enterprise Monitor), \u043e\u0442 4.0.4 \u0434\u043e 4.0.4.5235 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Enterprise Monitor), \u043e\u0442 8.0.0 \u0434\u043e 8.0.0.8131 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Enterprise Monitor), \u0434\u043e 8.0.13 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Enterprise Monitor), \u0434\u043e 4.0.7 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Enterprise Monitor), \u043e\u0442 8.0.0 \u0434\u043e 8.0.11 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Connectors), 46.5 (Communications EAGLE Software), 46.6 (Communications EAGLE Software), 46.7 (Communications EAGLE Software)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f OpenSSL:\nhttps://www.openssl.org/news/secadv/20171207.txt\t\nhttps://www.openssl.org/news/secadv/20180327.txt\n\n\u0414\u043b\u044f Node.js:\nhttps://nodejs.org/en/blog/vulnerability/december-2017-security-releases/\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://www.debian.org/security/2017/dsa-4065\t\nhttps://www.debian.org/security/2018/dsa-4157\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/cve-2017-3738\n \n\u0414\u043b\u044f Ubuntu:\nhttps://ubuntu.com/security/notices/USN-3512-1\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Oracle Corp.:\nhttp://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html\t\nhttp://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html\t\nhttp://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\t\nhttp://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\nhttps://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\t\nhttps://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\t\nhttps://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "06.12.2017",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "15.06.2021",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "15.06.2021",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2021-03037",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2017-3738",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "API Gateway, Transportation Management, Red Hat Enterprise Linux, Ubuntu, Debian GNU/Linux, Enterprise Manager Ops Center, JD Edwards EnterpriseOne Tools, Tuxedo, PeopleSoft Enterprise PeopleTools, Primavera P6 Enterprise Project Portfolio Management, Communications WebRTC Session Controller, Communications Application Session Controller, Communications Network Charging and Control, Agile Engineering Data Management, Secure Global Desktop, Enterprise Manager Base Platform, Endeca Server, Node.js, MySQL Connectors, Communications EAGLE LNP Application Processor, Communications Operations Monitor, Communications Session Border Controller, Communications Unified Session Manager, Enterprise Communications Broker, Enterprise Session Border Controller, JD Edwards World Security, MySQL Workbench, OSS Support Tools, Communications Diameter Signaling Router, MySQL Server, OpenSSL, Oracle Endeca Information Discovery Studio, MySQL Enterprise Monitor, Communications EAGLE Software",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 7 , Canonical Ltd. Ubuntu 17.04 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , Canonical Ltd. Ubuntu 17.10 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 8 , Canonical Ltd. Ubuntu 16.04 ESM ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0446\u0435\u0434\u0443\u0440\u044b AVX2 Montgomery \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 OpenSSL, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0426\u0435\u043b\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u043e\u0435 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0438\u043b\u0438 \u0446\u0438\u043a\u043b\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0441\u0434\u0432\u0438\u0433 (CWE-190), \u0420\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 (CWE-200)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0446\u0435\u0434\u0443\u0440\u044b AVX2 Montgomery \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 OpenSSL \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u0437\u0430\u0449\u0438\u0442\u044b \u0441\u043b\u0443\u0436\u0435\u0431\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0437\u0430\u043a\u0440\u044b\u0442\u043e\u0433\u043e \u043a\u043b\u044e\u0447\u0430 DH1024",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0431\u043e\u0440 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html\t\nhttp://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html\t\nhttp://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\t\nhttp://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\t\nhttp://www.securityfocus.com/bid/102118\t\nhttp://www.securitytracker.com/id/1039978\t\nhttps://access.redhat.com/errata/RHSA-2018:0998\t\nhttps://access.redhat.com/errata/RHSA-2018:2185\t\nhttps://access.redhat.com/errata/RHSA-2018:2186\t\nhttps://access.redhat.com/errata/RHSA-2018:2187\t\nhttps://github.com/openssl/openssl/commit/e502cc86df9dafded1694fceb3228ee34d11c11a\t\nhttps://nodejs.org/en/blog/vulnerability/december-2017-security-releases/\t\nhttps://security.FreeBSD.org/advisories/FreeBSD-SA-17:12.openssl.asc\t\nhttps://security.gentoo.org/glsa/201712-03\t\nhttps://security.netapp.com/advisory/ntap-20171208-0001/\t \nhttps://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbst03881en_us\t\nhttps://www.debian.org/security/2017/dsa-4065\t\nhttps://www.debian.org/security/2018/dsa-4157\t\nhttps://www.openssl.org/news/secadv/20171207.txt\t\nhttps://www.openssl.org/news/secadv/20180327.txt\t\nhttps://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\t\nhttps://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\t\nhttps://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\t\nhttps://www.tenable.com/security/tns-2017-16\t\nhttps://www.tenable.com/security/tns-2018-04\t\nhttps://www.tenable.com/security/tns-2018-06\t\nhttps://www.tenable.com/security/tns-2018-07\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-3738",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u044b\u0445 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u0437\u0430\u0449\u0438\u0442\u044b, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u0421\u0423\u0411\u0414, \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0437\u0430\u0449\u0438\u0442\u044b",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-190, CWE-200",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,3)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,9)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…