{"id":"CVE-2020-1967","details":"Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the \"signature_algorithms_cert\" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).","aliases":["GHSA-jq65-29v4-4x35","RUSTSEC-2020-0015"],"modified":"2026-04-11T12:32:52.882522Z","published":"2020-04-21T14:15:11.287Z","related":["CGA-fj68-687p-4cq7","SUSE-SU-2020:1058-1","SUSE-SU-2020:2041-1","openSUSE-SU-2020:0933-1","openSUSE-SU-2020:0945-1","openSUSE-SU-2024:11127-1","openSUSE-SU-2024:11359-1","openSUSE-SU-2024:11360-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"fixed":"9.2.5.0"}],"cpe":"cpe:2.3:a:jdedwards:enterpriseone:*:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"introduced":"9.5"}],"cpe":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","source":"CPE_FIELD"},{"extracted_events":[{"introduced":"7.3"}],"cpe":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12.1.3"}],"cpe":"cpe:2.3:a:oracle:application_server:12.1.3:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"13.4.0.0"}],"cpe":"cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"13.3.0.0"}],"cpe":"cpe:2.3:a:oracle:enterprise_manager_for_storage_management:13.3.0.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"13.4.0.0"}],"cpe":"cpe:2.3:a:oracle:enterprise_manager_for_storage_management:13.4.0.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12.4.0"}],"cpe":"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12.2.1.4.0"}],"cpe":"cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.56"}],"cpe":"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.57"}],"cpe":"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.58"}],"cpe":"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.59"}],"cpe":"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"fixed":"6.0.9"}],"cpe":"cpe:2.3:a:tenable:log_correlation_engine:*:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"10.0"}],"cpe":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"30"}],"cpe":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"31"}],"cpe":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"32"}],"cpe":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12.1-NA"}],"cpe":"cpe:2.3:o:freebsd:freebsd:12.1:-:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"15.1"}],"cpe":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"15.2"}],"cpe":"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=eb563247aef3e83dda7679c43f9649270462e5b1"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r66ea9c436da150683432db5fbc8beb8ae01886c6459ac30c2cea7345%40%3Cdev.tomcat.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r94d6ac3f010a38fccf4f432b12180a13fa1cf303559bd805648c9064%40%3Cdev.tomcat.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r9a41e304992ce6aec6585a87842b4f2e692604f5c892c37e3b0587ee%40%3Cdev.tomcat.apache.org%3E"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00004.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00011.html"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/157527/OpenSSL-signature_algorithms_cert-Denial-Of-Service.html"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2020/May/5"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2020/04/22/2"},{"type":"ADVISORY","url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44440"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202004-10"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20200424-0003/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20200717-0004/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4661"},{"type":"ADVISORY","url":"https://www.openssl.org/news/secadv/20200421.txt"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"ADVISORY","url":"https://www.synology.com/security/advisory/Synology_SA_20_05"},{"type":"ADVISORY","url":"https://www.synology.com/security/advisory/Synology_SA_20_05_OpenSSL"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2020-03"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2020-04"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2020-11"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2021-10"},{"type":"FIX","url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-20:11.openssl.asc"},{"type":"FIX","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"type":"EVIDENCE","url":"https://github.com/irsl/CVE-2020-1967"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"0"},{"last_affected":"527c12ed611f3fe072c3043734319edb2c733099"},{"last_affected":"b79ac1111737174c1b36ab5f63275f0191c000dc"},{"last_affected":"2acf164f591dafa204a8867a0c4618f4aa420fe5"},{"last_affected":"b17eb938b91d457c0fbdc3c4691cf3b810e32a15"},{"last_affected":"7d10c82196c8e45554f27c00681474a9fb86d137"},{"last_affected":"efbb9d45c1b82288efb404b2f865d00db504a28f"},{"last_affected":"f8cdce86448a211511e8a039c62580ae16cb96f5"},{"introduced":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"last_affected":"7d10c82196c8e45554f27c00681474a9fb86d137"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"9.0"},{"last_affected":"a9.4"},{"last_affected":"5.6.48"},{"introduced":"5.7.0"},{"last_affected":"5.7.30"},{"last_affected":"8.0.20"},{"last_affected":"4.0.12"},{"last_affected":"8.0.21"},{"introduced":"8.0.0"},{"last_affected":"8.0.20"}],"cpe":["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*","cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*","cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*","cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*"],"source":"CPE_FIELD"}}],"versions":["mysql-3.23.22-beta","mysql-3.23.28-gamma","mysql-3.23.30-gamma","mysql-3.23.31","mysql-3.23.32","mysql-3.23.33","mysql-3.23.36","mysql-4.0.11","mysql-4.0.12","mysql-4.0.2","mysql-4.0.4","mysql-4.0.6","mysql-4.0.7","mysql-4.0.8","mysql-4.0.9","mysql-5.1.4","mysql-5.6.40","mysql-5.6.45","mysql-5.6.47","mysql-5.6.48","mysql-5.7.30","mysql-8.0.20","mysql-8.0.21","mysql-9.0.0","mysql-9.0.0-release","mysql-9.4.0","mysql-cluster-8.0.20","mysql-cluster-8.0.21","mysql-cluster-9.0.0","mysql-cluster-9.4.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-1967.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/openssl/openssl","events":[{"introduced":"e04bd3433fd84e1861bf258ea37928d9845e6a86"},{"last_affected":"e04bd3433fd84e1861bf258ea37928d9845e6a86"}],"database_specific":{"extracted_events":[{"introduced":"1.1.1d"},{"last_affected":"1.1.1f"}],"cpe":"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["OpenSSL_1_1_1w"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-1967.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}