Rewterz Threat Alert – Nanocore – Active IoCs
March 25, 2021Rewterz Threat Alert – AZORult Malware – Active IOCs
March 26, 2021Rewterz Threat Alert – Nanocore – Active IoCs
March 25, 2021Rewterz Threat Alert – AZORult Malware – Active IOCs
March 26, 2021Severity
High
Analysis Summary
CVE-2021-3449
OpenSSL is vulnerable to a denial of service, caused by a NULL pointer dereference in signature_algorithms processing. By sending a specially crafted renegotiation ClientHello message from a client, a remote attacker could exploit this vulnerability to cause the TLS server to crash.
CVE-2021-3450
OpenSSL could allow a remote attacker to bypass security restrictions, caused by a a missing check in the validation logic of X.509 certificate chains by the X509_V_FLAG_X509_STRICT flag. By using any valid certificate or certificate chain to sign a specially crafted certificate, an attacker could bypass the check that non-CA certificates must not be able to issue other certificates and override the default purpose.
Impact
- Denial of Service
- Bypass Security
Affected Vendors
OpenSSL
Affected Products
- OpenSSL OpenSSL 1.1.1h
- OpenSSL OpenSSL 1.1.1i
- OpenSSL OpenSSL 1.1.1j
Remediation
Refer to OpenSSL Security Advisory for patch, upgrade or suggested workaround information.