VuXML ID | Description |
8305e215-1080-11e5-8ba2-000c2980a9f3 | openssl -- multiple vulnerabilities
The OpenSSL team reports:
- Missing DHE man-in-the-middle protection (Logjam)
(CVE-2015-4000)
- Malformed ECParameters causes infinite loop (CVE-2015-1788)
- Exploitable out-of-bounds read in X509_cmp_time
(CVE-2015-1789)
- PKCS#7 crash with missing EnvelopedContent (CVE-2015-1790)
- CMS verify infinite loop with unknown hash function
(CVE-2015-1792)
- Race condition handling NewSessionTicket (CVE-2015-1791)
- Invalid free in DTLS (CVE-2014-8176)
Discovery 2015-06-11 Entry 2015-06-11 Modified 2016-08-09 openssl
< 1.0.2_2
mingw32-openssl
ge 1.0.1 lt 1.0.2b
linux-c6-openssl
< 1.0.1e_6
libressl
< 2.1.7
FreeBSD
ge 10.1 lt 10.1_12
ge 9.3 lt 9.3_16
ge 8.4 lt 8.4_30
CVE-2014-8176
CVE-2015-1788
CVE-2015-1789
CVE-2015-1790
CVE-2015-1791
CVE-2015-1792
CVE-2015-4000
SA-15:10.openssl
https://www.openssl.org/news/secadv_20150611.txt
|
4c8d1d72-9b38-11e5-aece-d050996490d0 | openssl -- multiple vulnerabilities
OpenSSL project reports:
- BN_mod_exp may produce incorrect results on x86_64
(CVE-2015-3193)
- Certificate verify crash with missing PSS parameter
(CVE-2015-3194)
- X509_ATTRIBUTE memory leak (CVE-2015-3195)
- Race condition handling PSK identify hint
(CVE-2015-3196)
- Anon DH ServerKeyExchange with 0 p parameter
(CVE-2015-1794)
Discovery 2015-12-03 Entry 2015-12-05 Modified 2016-08-09 openssl
< 1.0.2_5
mingw32-openssl
ge 1.0.1 lt 1.0.2e
linux-c6-openssl
< 1.0.1e_7
FreeBSD
ge 10.2 lt 10.2_8
ge 10.1 lt 10.1_25
ge 9.3 lt 9.3_31
SA-15:26.openssl
CVE-2015-1794
CVE-2015-3193
CVE-2015-3194
CVE-2015-3195
CVE-2015-3196
https://www.openssl.org/news/secadv/20151203.txt
|
9d15355b-ce7c-11e4-9db0-d050992ecde8 | OpenSSL -- multiple vulnerabilities
OpenSSL project reports:
- Reclassified: RSA silently downgrades to EXPORT_RSA
[Client] (CVE-2015-0204). OpenSSL only.
- Segmentation fault in ASN1_TYPE_cmp (CVE-2015-0286)
- ASN.1 structure reuse memory corruption (CVE-2015-0287)
- PKCS#7 NULL pointer dereferences (CVE-2015-0289)
- Base64 decode (CVE-2015-0292). OpenSSL only.
- DoS via reachable assert in SSLv2 servers
(CVE-2015-0293). OpenSSL only.
- Use After Free following d2i_ECPrivatekey error
(CVE-2015-0209)
- X509_to_X509_REQ NULL pointer deref (CVE-2015-0288)
Discovery 2015-03-19 Entry 2015-03-19 Modified 2016-08-09 openssl
ge 1.0.1 lt 1.0.1_19
mingw32-openssl
ge 1.0.1 lt 1.0.1m
linux-c6-openssl
< 1.0.1e_4
libressl
le 2.1.5_1
FreeBSD
ge 10.1 lt 10.1_8
ge 9.3 lt 9.3_12
ge 8.4 lt 8.4_26
SA-15:06.openssl
ports/198681
CVE-2015-0204
CVE-2015-0286
CVE-2015-0287
CVE-2015-0289
CVE-2015-0292
CVE-2015-0293
CVE-2015-0209
CVE-2015-0288
https://www.openssl.org/news/secadv_20150319.txt
|
3679fd10-c5d1-11e5-b85f-0018fe623f2b | openssl -- multiple vulnerabilities
OpenSSL project reports:
- Historically OpenSSL only ever generated DH parameters based on "safe"
primes. More recently (in version 1.0.2) support was provided for
generating X9.42 style parameter files such as those required for RFC 5114
support. The primes used in such files may not be "safe". Where an
application is using DH configured with parameters based on primes that are
not "safe" then an attacker could use this fact to find a peer's private
DH exponent. This attack requires that the attacker complete multiple
handshakes in which the peer uses the same private DH exponent. For example
this could be used to discover a TLS server's private DH exponent if it's
reusing the private DH exponent or it's using a static DH ciphersuite.
OpenSSL provides the option SSL_OP_SINGLE_DH_USE for ephemeral DH (DHE) in
TLS. It is not on by default. If the option is not set then the server
reuses the same private DH exponent for the life of the server process and
would be vulnerable to this attack. It is believed that many popular
applications do set this option and would therefore not be at risk.
(CVE-2016-0701)
- A malicious client can negotiate SSLv2 ciphers that have been disabled on
the server and complete SSLv2 handshakes even if all SSLv2 ciphers have
been disabled, provided that the SSLv2 protocol was not also disabled via
SSL_OP_NO_SSLv2.
(CVE-2015-3197)
Discovery 2016-01-22 Entry 2016-01-28 Modified 2016-08-09 openssl
< 1.0.2_7
mingw32-openssl
ge 1.0.1 lt 1.0.2f
FreeBSD
ge 10.2 lt 10.2_12
ge 10.1 lt 10.1_29
ge 9.3 lt 9.3_36
SA-16:11.openssl
CVE-2016-0701
CVE-2015-3197
https://www.openssl.org/news/secadv/20160128.txt
|