{"id":"CVE-2017-3731","details":"If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.","modified":"2026-04-16T01:37:57.276212108Z","published":"2017-05-04T19:29:00.353Z","related":["SUSE-FU-2022:0445-1","SUSE-SU-2017:0431-1","SUSE-SU-2017:0441-1","SUSE-SU-2017:0461-1","SUSE-SU-2017:0495-1","SUSE-SU-2017:0855-1","SUSE-SU-2017:2700-1","SUSE-SU-2018:0112-1","openSUSE-SU-2024:11125-1","openSUSE-SU-2024:11126-1","openSUSE-SU-2024:11127-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0286.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3773"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95813"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1037717"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2185"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2186"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2187"},{"type":"ADVISORY","url":"https://github.com/openssl/openssl/commit/00d965474b22b54e4275232bc71ee0c699c5cd21"},{"type":"ADVISORY","url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201702-07"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20171019-0002/"},{"type":"ADVISORY","url":"https://security.paloaltonetworks.com/CVE-2017-3731"},{"type":"ADVISORY","url":"https://source.android.com/security/bulletin/pixel/2017-11-01"},{"type":"ADVISORY","url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us"},{"type":"ADVISORY","url":"https://www.openssl.org/news/secadv/20170126.txt"},{"type":"ADVISORY","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2017-04"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"type":"FIX","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nodejs/node","events":[{"introduced":"362fe010fe8f6feb0030e1e02c689b501e11ddb7"},{"fixed":"a34f1d644905b1989bebfb8658220b2a692a1589"},{"introduced":"6b1c40be84fbe5ea404f25e4e340a0c1fe67a60a"},{"fixed":"37a8051594719584ed35e88e4862dc5540427beb"},{"introduced":"6dc12b1042d5d4727f77e8a1c5758dab91400069"},{"fixed":"79f015aa49f29185aadeb29cd5c06843745f72e2"}]}],"versions":["v4.2.0","v4.2.1","v4.2.2","v4.2.3","v4.2.4","v4.2.5","v4.2.6","v4.3.0","v4.3.1","v4.3.2","v4.4.0","v4.4.1","v4.4.2","v4.4.3","v4.4.4","v4.4.5","v4.4.6","v4.4.7","v4.5.0","v4.6.0","v4.6.1","v4.6.2","v4.7.0","v4.7.1","v4.7.2","v6.9.0","v6.9.1","v6.9.2","v6.9.3","v6.9.4","v7.0.0","v7.1.0","v7.2.0","v7.2.1","v7.3.0","v7.4.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-3731.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/openssl/openssl","events":[{"introduced":"0"},{"fixed":"00d965474b22b54e4275232bc71ee0c699c5cd21"}]}],"versions":["BEFORE_engine","OpenSSL_0_9_1c","OpenSSL_0_9_2b","OpenSSL_0_9_3","OpenSSL_0_9_3a","OpenSSL_0_9_3beta2","OpenSSL_0_9_4","OpenSSL_0_9_5a","OpenSSL_0_9_5a-beta1","OpenSSL_0_9_5a-beta2","OpenSSL_0_9_5beta1","OpenSSL_0_9_5beta2","OpenSSL_0_9_6-beta3","OpenSSL_1_1_0","OpenSSL_1_1_0-pre1","OpenSSL_1_1_0-pre2","OpenSSL_1_1_0-pre3","OpenSSL_1_1_0-pre4","OpenSSL_1_1_0-pre5","OpenSSL_1_1_0-pre6","OpenSSL_1_1_0a","OpenSSL_1_1_0b","OpenSSL_1_1_0c","master-post-auto-reformat","master-post-reformat","master-pre-auto-reformat","master-pre-reformat"],"database_specific":{"vanir_signatures":[{"source":"https://github.com/openssl/openssl/commit/00d965474b22b54e4275232bc71ee0c699c5cd21","id":"CVE-2017-3731-1941b72b","deprecated":false,"signature_version":"v1","digest":{"function_hash":"221735333621247249205544300326653651031","length":1781},"target":{"function":"aes_ccm_ctrl","file":"crypto/evp/e_aes.c"},"signature_type":"Function"},{"source":"https://github.com/openssl/openssl/commit/00d965474b22b54e4275232bc71ee0c699c5cd21","id":"CVE-2017-3731-41add88c","deprecated":false,"signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["258332393461523318300772418283316247240","139455449470853885843312740408088404667","299560138836707757772546515239509527055","196819153725239350090704975974326428859","107191961654897997411654721196022093301","15996322021237148727573568799963605600","57798510971080246332159561077791581992","151878145502330302568752946372148960554","147327775481107408714039356309321399255","21217088637283268914316745231029260860","33610301170652250267779137292753224093","199725929091931850549957399955877992477"]},"target":{"file":"crypto/evp/e_aes.c"},"signature_type":"Line"},{"deprecated":false,"id":"CVE-2017-3731-9e5d08af","source":"https://github.com/openssl/openssl/commit/00d965474b22b54e4275232bc71ee0c699c5cd21","signature_version":"v1","digest":{"function_hash":"190075725278115512198961705506710166462","length":2576},"target":{"function":"chacha20_poly1305_ctrl","file":"crypto/evp/e_chacha20_poly1305.c"},"signature_type":"Function"},{"source":"https://github.com/openssl/openssl/commit/00d965474b22b54e4275232bc71ee0c699c5cd21","id":"CVE-2017-3731-d1cf9f8d","deprecated":false,"signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["249268130122618982221397096100961611788","49308803901569287939821745393558810880","102123395012805653234972220826876345324","287229816695624475669447046210770439239","163478244482245408513206232913317490644","338244759701655409950710234690089770936","95801878201965267387487323207020864476"]},"target":{"file":"crypto/evp/e_chacha20_poly1305.c"},"signature_type":"Line"},{"deprecated":false,"id":"CVE-2017-3731-f46e33f4","source":"https://github.com/openssl/openssl/commit/00d965474b22b54e4275232bc71ee0c699c5cd21","signature_version":"v1","digest":{"function_hash":"263680761763399615688609265863755459005","length":2923},"target":{"function":"aes_gcm_ctrl","file":"crypto/evp/e_aes.c"},"signature_type":"Function"}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-3731.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}