VYPR
High severity7.5NVD Advisory· Published May 4, 2017· Updated May 13, 2026

CVE-2017-3731

CVE-2017-3731

Description

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

Affected products

19
  • Node.js/Node.js2 versions
    cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*+ 1 more
    • cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*range: >=4.0.0,<=4.1.2
    • cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*range: >=4.2.0,<4.7.3
  • cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*+ 16 more
    • cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*
    • (no CPE)range: openssl-1.1.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

20

News mentions

0

No linked articles in our index yet.