Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-1971
HistoryDec 08, 2020 - 12:00 a.m.

CVE-2020-1971

2020-12-0800:00:00
ubuntu.com
ubuntu.com
27

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.004 Low

EPSS

Percentile

74.1%

The X.509 GeneralName type is a generic type for representing different
types of names. One of those name types is known as EDIPartyName. OpenSSL
provides a function GENERAL_NAME_cmp which compares different instances of
a GENERAL_NAME to see if they are equal or not. This function behaves
incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer
dereference and a crash may occur leading to a possible denial of service
attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes:

  1. Comparing CRL distribution point names between an available CRL and a
    CRL distribution point embedded in an X509 certificate 2) When verifying
    that a timestamp response token signer matches the timestamp authority name
    (exposed via the API functions TS_RESP_verify_response and
    TS_RESP_verify_token) If an attacker can control both items being compared
    then that attacker could trigger a crash. For example if the attacker can
    trick a client or server into checking a malicious certificate against a
    malicious CRL then this may occur. Note that some applications
    automatically download CRLs based on a URL embedded in a certificate. This
    checking happens prior to the signatures on the certificate and CRL being
    verified. OpenSSL’s s_server, s_client and verify tools have support for
    the “-crl_download” option which implements automatic CRL downloading and
    this attack has been demonstrated to work against those tools. Note that an
    unrelated bug means that affected versions of OpenSSL cannot parse or
    construct correct encodings of EDIPARTYNAME. However it is possible to
    construct a malformed EDIPARTYNAME that OpenSSL’s parser will accept and
    hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are
    affected by this issue. Other OpenSSL releases are out of support and have
    not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in
    OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).

Notes

Author Note
mdeslaur edk2 doesn’t use the OpenSSL GENERAL_NAME_cmp function, so it is not vulnerable to this issue.
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchopenssl< 1.1.1-1ubuntu2.1~18.04.7UNKNOWN
ubuntu20.04noarchopenssl< 1.1.1f-1ubuntu2.1UNKNOWN
ubuntu20.10noarchopenssl< 1.1.1f-1ubuntu4.1UNKNOWN
ubuntu14.04noarchopenssl< 1.0.1f-1ubuntu2.27+esm2) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu16.04noarchopenssl< 1.0.2g-1ubuntu4.18UNKNOWN
ubuntu18.04noarchopenssl1.0< 1.0.2n-1ubuntu5.5UNKNOWN

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.004 Low

EPSS

Percentile

74.1%