CVE Vulnerabilities

CVE-2021-3449

NULL Pointer Dereference

Published: Mar 25, 2021 | Modified: Nov 21, 2024
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
5.9 IMPORTANT
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
HIGH
root.io logo minimus.io logo echo.ai logo

An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
OpensslOpenssl1.1.1 (including)1.1.1k (excluding)
JBCS 2.4.37 SP7RedHatopenssl*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-httpd-0:2.4.37-70.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_cluster-native-0:1.3.14-20.Final_redhat_2.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_http2-0:1.15.7-14.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_jk-0:1.2.48-13.redhat_1.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_md-1:2.0.8-33.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_security-0:2.9.2-60.GA.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-nghttp2-0:1.39.2-37.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-openssl-1:1.1.1g-6.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-openssl-chil-0:1.0.0-5.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-openssl-pkcs11-0:0.4.10-20.jbcs.el7*
Red Hat Enterprise Linux 8RedHatopenssl-1:1.1.1g-15.el8_3*
Red Hat Enterprise Linux 8.1 Extended Update SupportRedHatopenssl-1:1.1.1c-5.el8_1*
Red Hat Enterprise Linux 8.2 Extended Update SupportRedHatopenssl-1:1.1.1c-18.el8_2*
Red Hat JBoss Web Server 3.1RedHatopenssl*
Red Hat JBoss Web Server 3 for RHEL 7RedHattomcat-native-0:1.2.23-24.redhat_24.ep7.el7*
Red Hat JBoss Web Server 5RedHat*
Red Hat JBoss Web Server 5.4 on RHEL 7RedHatjws5-tomcat-native-0:1.2.25-4.redhat_4.el7jws*
Red Hat JBoss Web Server 5.4 on RHEL 8RedHatjws5-tomcat-native-0:1.2.25-4.redhat_4.el8jws*
Red Hat Virtualization 4 for Red Hat Enterprise Linux 8RedHatredhat-virtualization-host-0:4.4.5-20210330.0.el8_3*
Edk2Ubuntutrusty*
NodejsUbuntutrusty*
OpensslUbuntubionic*
OpensslUbuntudevel*
OpensslUbuntuesm-infra/bionic*
OpensslUbuntuesm-infra/focal*
OpensslUbuntufips-preview/jammy*
OpensslUbuntufips-updates/bionic*
OpensslUbuntufips-updates/focal*
OpensslUbuntufips-updates/jammy*
OpensslUbuntufips/bionic*
OpensslUbuntufips/focal*
OpensslUbuntufocal*
OpensslUbuntugroovy*
OpensslUbuntuhirsute*
OpensslUbuntuimpish*
OpensslUbuntujammy*
OpensslUbuntukinetic*
OpensslUbuntulunar*
OpensslUbuntumantic*
OpensslUbuntunoble*
OpensslUbuntuoracular*
OpensslUbuntuplucky*
OpensslUbuntuquesting*
OpensslUbuntutrusty*
Postgresql-10Ubuntubionic*
Postgresql-10Ubuntuesm-infra/bionic*
Postgresql-10Ubuntuupstream*
Postgresql-12Ubuntuesm-infra/focal*
Postgresql-12Ubuntufocal*
Postgresql-12Ubuntutrusty*
Postgresql-12Ubuntuupstream*
Postgresql-13Ubuntuhirsute*
Postgresql-13Ubuntuimpish*
Postgresql-9.1Ubuntutrusty*
Postgresql-9.3Ubuntutrusty*
Postgresql-9.3Ubuntutrusty/esm*
Postgresql-9.3Ubuntuupstream*
Postgresql-9.5Ubuntuupstream*
Postgresql-9.5Ubuntuxenial*

Potential Mitigations

References