{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T23:52:32.665","vulnerabilities":[{"cve":{"id":"CVE-2017-3733","sourceIdentifier":"openssl-security@openssl.org","published":"2017-05-04T19:29:00.430","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"During a renegotiation handshake if the Encrypt-Then-Mac extension is negotiated where it was not in the original handshake (or vice-versa) then this can cause OpenSSL 1.1.0 before 1.1.0e to crash (dependent on ciphersuite). Both clients and servers are affected."},{"lang":"es","value":"Durante un protocolo de enlace de renegociación, si la extensión Encrypt-Then-Mac es negociada cuando no estaba en el protocolo de enlace original (o viceversa), se podría provocar el cierre inesperado de OpenSSL (dependiente de una suite de cifrado) en versiones 1.1.0 anteriores a la 1.1.0e. Tanto los clientes como los servidores se ven afectados."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*","matchCriteriaId":"73104834-5810-48DD-9B97-549D223853F1"},{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*","matchCriteriaId":"C9D7A18A-116B-4F68-BEA3-A4E9DDDA55C6"},{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*","matchCriteriaId":"CFC70262-0DCD-4B46-9C96-FD18D0207511"},{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*","matchCriteriaId":"B2E07A34-08A0-4765-AF81-46A3BDC5648A"},{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:1.1.0d:*:*:*:*:*:*:*","matchCriteriaId":"83B0A3D8-60C7-4F42-9DD6-C535F983D98B"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hp:operations_agent:11.14:*:*:*:*:*:*:*","matchCriteriaId":"739CE0EF-9D08-4A26-A82A-A117DBBF0717"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:operations_agent:11.15:*:*:*:*:*:*:*","matchCriteriaId":"3429CA31-3B98-4227-8FB5-A56CAFFD641E"}]}]}],"references":[{"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html","source":"openssl-security@openssl.org"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","source":"openssl-security@openssl.org"},{"url":"http://www.securityfocus.com/bid/96269","source":"openssl-security@openssl.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1037846","source":"openssl-security@openssl.org"},{"url":"https://github.com/openssl/openssl/commit/4ad93618d26a3ea23d36ad5498ff4f59eff3a4d2","source":"openssl-security@openssl.org"},{"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03728en_us","source":"openssl-security@openssl.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://www.openssl.org/news/secadv/20170216.txt","source":"openssl-security@openssl.org","tags":["Vendor Advisory"]},{"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","source":"openssl-security@openssl.org"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/96269","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1037846","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://github.com/openssl/openssl/commit/4ad93618d26a3ea23d36ad5498ff4f59eff3a4d2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03728en_us","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://www.openssl.org/news/secadv/20170216.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}