CVE-2021-3711
Published at:
-
24-08-2021 05:15
Last modified:
-
16-10-2022 07:15
Total changes:
-
16
Description
Common Vulnerability Scoring System (CVSS)
Low
Attack complexity
Network
Attack vector
High
Availability
High
Confidentiality
High
Integrity
None
Privileges required
Unchanged
Scope
None
User interaction
9.8
Base score
3.9
5.9
Exploitability score
Impact score
Verification logic
Reference
- https://www.openssl.org/news/secadv/20210824.txt
- https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
- DSA-4963-Third Party Advisory
- [tomcat-dev] 20210825 OpenSSL security announcement - do we need a Tomcat Native release?-Mailing List, Third Party Advisory
- [oss-security] 20210825 OpenSSL SM2 Decryption Buffer Overflow (CVE-2021-3711), Read buffer overruns processing ASN.1 strings (CVE-2021-3712)-Mailing List, Third Party Advisory
- [tomcat-dev] 20210826 Re: OpenSSL security announcement - do we need a Tomcat Native release?-Mailing List, Third Party Advisory
- https://security.netapp.com/advisory/ntap-20210827-0010/
- https://www.tenable.com/security/tns-2021-16
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://security.netapp.com/advisory/ntap-20211022-0003/
- https://www.tenable.com/security/tns-2022-02
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://www.oracle.com/security-alerts/cpuapr2022.html
- GLSA-202209-02-Third Party Advisory
- GLSA-202210-02-
Keywords