In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial of Service attack.
[
{
"signature_version": "v1",
"signature_type": "Function",
"source": "https://github.com/openssl/openssl/commit/efbe126e3ebb9123ac9d058aa2bb044261342aaa",
"id": "CVE-2017-3730-1aad85c3",
"target": {
"function": "tls_construct_cke_ecdhe",
"file": "ssl/statem/statem_clnt.c"
},
"deprecated": false,
"digest": {
"function_hash": "257890200851280660739288133489084953939",
"length": 942.0
}
},
{
"signature_version": "v1",
"signature_type": "Line",
"source": "https://github.com/openssl/openssl/commit/efbe126e3ebb9123ac9d058aa2bb044261342aaa",
"id": "CVE-2017-3730-68fc7cf3",
"target": {
"file": "ssl/statem/statem_clnt.c"
},
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"11913848747542421415906338359746620769",
"287977064637751600933892521007570061603",
"75632844330391608306880641979290274794",
"72672834426414620024176760786350314603",
"22420263237889046951604396148376714523",
"74913937599607707084124611264251187820",
"17205899439547006571301104330155329558",
"247200306413930743667171147817033167050"
]
}
},
{
"signature_version": "v1",
"signature_type": "Function",
"source": "https://github.com/openssl/openssl/commit/efbe126e3ebb9123ac9d058aa2bb044261342aaa",
"id": "CVE-2017-3730-d4f05f43",
"target": {
"function": "tls_construct_cke_dhe",
"file": "ssl/statem/statem_clnt.c"
},
"deprecated": false,
"digest": {
"function_hash": "130998826456393305051557197549969402375",
"length": 838.0
}
}
]