CVE-2020-1967

HIGH

Openssl < 1.1.1f - NULL Pointer Dereference

Title source: rule

Description

Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).

Exploits (1)

nomisec WORKING POC 20 stars
by irsl · poc
https://github.com/irsl/CVE-2020-1967

References (32)

... and 12 more

Scores

CVSS v3 7.5
EPSS 0.6077
EPSS Percentile 98.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-476
Status published
Products (36)
broadcom/fabric_operating_system
crates.io/openssl-src 111.6.0 - 111.9.0crates.io
debian/debian_linux 9.0
debian/debian_linux 10.0
fedoraproject/fedora 30
fedoraproject/fedora 31
fedoraproject/fedora 32
freebsd/freebsd 12.1
jdedwards/enterpriseone < 9.2.5.0
netapp/active_iq_unified_manager 7.3
... and 26 more
Published Apr 21, 2020
Tracked Since Feb 18, 2026