High severity7.5NVD Advisory· Published May 4, 2017· Updated May 13, 2026
CVE-2017-3731
CVE-2017-3731
Description
If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.
Affected products
19cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*+ 16 more
- cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*
- (no CPE)range: openssl-1.1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
20- www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlnvdPatchThird Party Advisory
- www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlnvdPatchThird Party Advisory
- www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlnvdPatchThird Party Advisory
- www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlnvdPatchThird Party Advisory
- rhn.redhat.com/errata/RHSA-2017-0286.htmlnvdThird Party Advisory
- www.debian.org/security/2017/dsa-3773nvdThird Party Advisory
- www.securityfocus.com/bid/95813nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1037717nvdThird Party AdvisoryVDB Entry
- access.redhat.com/errata/RHSA-2018:2185nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2018:2186nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2018:2187nvdThird Party Advisory
- github.com/openssl/openssl/commit/00d965474b22b54e4275232bc71ee0c699c5cd21nvdThird Party Advisory
- security.freebsd.org/advisories/FreeBSD-SA-17:02.openssl.ascnvdThird Party Advisory
- security.gentoo.org/glsa/201702-07nvdThird Party Advisory
- security.netapp.com/advisory/ntap-20171019-0002/nvdThird Party Advisory
- security.paloaltonetworks.com/CVE-2017-3731nvdThird Party Advisory
- source.android.com/security/bulletin/pixel/2017-11-01nvdThird Party Advisory
- support.hpe.com/hpsc/doc/public/displaynvdThird Party Advisory
- www.openssl.org/news/secadv/20170126.txtnvdVendor Advisory
- www.tenable.com/security/tns-2017-04nvdThird Party Advisory
News mentions
0No linked articles in our index yet.