CVE-2024-6119
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/09/2024
Last modified:
03/06/2025
Description
Issue summary: Applications performing certificate name checks (e.g., TLS<br />
clients checking server certificates) may attempt to read an invalid memory<br />
address resulting in abnormal termination of the application process.<br />
<br />
Impact summary: Abnormal termination of an application can a cause a denial of<br />
service.<br />
<br />
Applications performing certificate name checks (e.g., TLS clients checking<br />
server certificates) may attempt to read an invalid memory address when<br />
comparing the expected name with an `otherName` subject alternative name of an<br />
X.509 certificate. This may result in an exception that terminates the<br />
application program.<br />
<br />
Note that basic certificate chain validation (signatures, dates, ...) is not<br />
affected, the denial of service can occur only when the application also<br />
specifies an expected DNS name, Email address or IP address.<br />
<br />
TLS servers rarely solicit client certificates, and even when they do, they<br />
generally don&#39;t perform a name check against a reference identifier (expected<br />
identity), but rather extract the presented identity after checking the<br />
certificate chain. So TLS servers are generally not affected and the severity<br />
of the issue is Moderate.<br />
<br />
The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.0.0 (including) | 3.0.15 (excluding) |
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.1.0 (including) | 3.1.7 (excluding) |
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.2.0 (including) | 3.2.3 (excluding) |
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.3.0 (including) | 3.3.2 (excluding) |
| cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* | ||
| cpe:2.3:a:netapp:management_services_for_element_software_and_netapp_hci:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:netapp:ontap_9:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:netapp:ontap_tools:9:*:*:*:*:vmware_vsphere:*:* | ||
| cpe:2.3:o:netapp:brocade_fabric_operating_system:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/openssl/openssl/commit/05f360d9e849a1b277db628f1f13083a7f8dd04f
- https://github.com/openssl/openssl/commit/06d1dc3fa96a2ba5a3e22735a033012aadc9f0d6
- https://github.com/openssl/openssl/commit/621f3729831b05ee828a3203eddb621d014ff2b2
- https://github.com/openssl/openssl/commit/7dfcee2cd2a63b2c64b9b4b0850be64cb695b0a0
- https://openssl-library.org/news/secadv/20240903.txt
- http://www.openwall.com/lists/oss-security/2024/09/03/4
- https://lists.freebsd.org/archives/freebsd-security/2024-September/000303.html
- https://security.netapp.com/advisory/ntap-20240912-0001/



