CVE-2015-3194

Severity

50%

Complexity

99%

Confidentiality

48%

CWE-476: NULL Pointer Dereference

crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.

CWE-476: NULL Pointer Dereference

CVSS 3.0 Base Score 7.5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

CVSS 2.0 Base Score 5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).

Overview

First reported 9 years ago

2015-12-06 20:59:00

Last updated 6 years ago

2019-02-07 16:19:00

Affected Software

OpenSSL Project OpenSSL 1.0.1

1.0.1

OpenSSL Project OpenSSL 1.0.1a

1.0.1a

OpenSSL Project OpenSSL 1.0.1b

1.0.1b

OpenSSL Project OpenSSL 1.0.1c

1.0.1c

OpenSSL Project OpenSSL 1.0.1d

1.0.1d

OpenSSL Project OpenSSL 1.0.1e

1.0.1e

OpenSSL Project OpenSSL 1.0.1f

1.0.1f

OpenSSL Project OpenSSL 1.0.1g

1.0.1g

OpenSSL Project OpenSSL 1.0.1h

1.0.1h

OpenSSL Project OpenSSL 1.0.1i

1.0.1i

OpenSSL Project OpenSSL 1.0.1j

1.0.1j

OpenSSL Project OpenSSL 1.0.1k

1.0.1k

OpenSSL Project OpenSSL 1.0.1l

1.0.1l

OpenSSL OpenSSL 1.0.1m

1.0.1m

OpenSSL Project OpenSSL 1.0.1n

1.0.1n

OpenSSL Project OpenSSL 1.0.1o

1.0.1o

OpenSSL OpenSSL 1.0.1p

1.0.1p

OpenSSL Project OpenSSL 1.0.2

1.0.2

OpenSSL OpenSSL 1.0.2a

1.0.2a

OpenSSL Project OpenSSL 1.0.2b

1.0.2b

OpenSSL Project OpenSSL 1.0.2c

1.0.2c

OpenSSL OpenSSL 1.0.2d

1.0.2d

Canonical Ubuntu Linux 12.04 LTS

12.04

Canonical Ubuntu Linux 14.04 LTS (Long-Term Support)

14.04

Canonical Ubuntu Linux 15.04

15.04

Canonical Ubuntu Linux 15.10

15.10

Debian Linux 7.0

7.0

Debian Linux 8.0 (Jessie)

8.0

References

http://fortiguard.com/advisory/openssl-advisory-december-2015

Third Party Advisory

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759

Third Party Advisory

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761

Third Party Advisory

FEDORA-2015-d87d60b9a9

Mailing List, Third Party Advisory

openSUSE-SU-2016:0637

Mailing List, Third Party Advisory

openSUSE-SU-2016:1332

Mailing List, Third Party Advisory

openSUSE-SU-2015:2288

Mailing List, Third Party Advisory

openSUSE-SU-2015:2289

Mailing List, Third Party Advisory

openSUSE-SU-2015:2318

Mailing List, Third Party Advisory

HPSBGN03536

Mailing List, Third Party Advisory

http://openssl.org/news/secadv/20151203.txt

Vendor Advisory

RHSA-2015:2617

Third Party Advisory

RHSA-2016:2957

Third Party Advisory

20151204 Multiple Vulnerabilities in OpenSSL (December 2015) Affecting Cisco Products

Third Party Advisory

DSA-3413

Third Party Advisory

http://www.fortiguard.com/advisory/openssl-advisory-december-2015

Third Party Advisory

http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html

Patch, Vendor Advisory

http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

Patch, Vendor Advisory

http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html

Patch, Vendor Advisory

http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html

Vendor Advisory

http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html

Vendor Advisory

78623

Third Party Advisory, VDB Entry

91787

Third Party Advisory, VDB Entry

1034294

Third Party Advisory, VDB Entry

SSA:2015-349-04

Third Party Advisory

USN-2830-1

Third Party Advisory

https://bugzilla.redhat.com/show_bug.cgi?id=1288320

Issue Tracking, Third Party Advisory

https://git.openssl.org/?p=openssl.git;a=commit;h=c394a488942387246653833359a5c94b5832674e

Vendor Advisory

https://git.openssl.org/?p=openssl.git;a=commit;h=d8541d7e9e63bf5f343af24644046c8d96498c17

Vendor Advisory

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944173

Third Party Advisory

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017

Third Party Advisory

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085

Third Party Advisory

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888

Third Party Advisory

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667

Third Party Advisory

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380

Third Party Advisory

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322

Third Party Advisory

https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100

Third Party Advisory

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.