Service Notices

All Notices > Security Notices > Vulnerability Warning on OpenSSL Buffer Overflow (CVE-2021-3711)

Vulnerability Warning on OpenSSL Buffer Overflow (CVE-2021-3711)

Aug 26, 2021 GMT+08:00

I. Overview

OpenSSL disclosed two buffer overflow vulnerabilities (CVE-2021-3711 and CVE-2021-3712) in its released versions. CVE-2021-3711 is highly risky. A malicious attacker may present SM2 content for decryption to an application, which can possibly change application behavior or cause the application to crash.

OpenSSL is an open-source software library. Applications can use this library to secure communications over computer networks against eavesdropping and identify the party at the other end. It is widely used on web servers. If you are an OpenSSL user, check your OpenSSL version and implement timely security hardening.

Reference: https://www.openssl.org/news/secadv/20210824.txt

II. Severity

Severity: important

(Severity: low, moderate, important, and critical)

III. Affected Products

Affected versions:

CVE-2021-3711:

1.1.1k and below

CVE-2021-3712:

1.1.1k and below

1.0.2y and below

Secure versions:

CVE-2021-3711:

1.1.1l and above

CVE-2021-3712:

1.1.1l and above

1.0.2za and above

IV. Security Recommendations

This vulnerability has been fixed in later official versions. If your service version falls into the affected range, upgrade it to a latest secure version.

https://www.openssl.org/source/

Note: Before fixing vulnerabilities, back up your files and conduct a thorough test.