CVE-2015-0285

The ssl3_client_hello function in s3_clnt.c in OpenSSL 1.0.2 before 1.0.2a does not ensure that the PRNG is seeded before proceeding with a handshake, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and then conducting a brute-force attack.

Published at
2015-03-19T22:59Z
3335 days ago
Modified
2022-12-13T12:15Z
509 days ago
CWE-310
Problem type

References


URLType
www.openssl.org
https://www.openssl.org/news/secadv_20150319.txt
CONFIRM
bugzilla.redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1202410
CONFIRM
git.openssl.org
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=e1b568dd2462f7cacf98f3d117936c34e2849a6b
CONFIRM
1031929
http://www.securitytracker.com/id/1031929
SECTRACK
www.oracle.com
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
CONFIRM
www.oracle.com
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
CONFIRM
bto.bluecoat.com
https://bto.bluecoat.com/security-advisory/sa92
CONFIRM
www.oracle.com
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
CONFIRM
HPSBMU03397
http://marc.info/?l=bugtraq&m=144050297101809&w=2
HP
HPSBMU03380
http://marc.info/?l=bugtraq&m=143748090628601&w=2
HP
HPSBMU03409
http://marc.info/?l=bugtraq&m=144050155601375&w=2
HP
www.oracle.com
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
CONFIRM
73234
http://www.securityfocus.com/bid/73234
BID
www.fortiguard.com
http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015
CONFIRM
GLSA-201503-11
https://security.gentoo.org/glsa/201503-11
GENTOO
kc.mcafee.com
https://kc.mcafee.com/corporate/index?page=content&id=SB10110
CONFIRM
www.oracle.com
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
CONFIRM
cert-portal.siemens.com
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
CONFIRM

GET https://vulnerabilitydata.com/api/details/CVE-2015-0285

{
	"id": "CVE-2015-0285",
	"published_date": "2015-03-19T22:59Z",
	"last_modified_date": "2022-12-13T12:15Z",
	"assigner": "secalert@redhat.com",
	"description": "The ssl3_client_hello function in s3_clnt.c in OpenSSL 1.0.2 before 1.0.2a does not ensure that the PRNG is seeded before proceeding with a handshake, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and then conducting a brute-force attack.",
	"references": [
		{
			"url": "https://www.openssl.org/news/secadv_20150319.txt",
			"name": "https://www.openssl.org/news/secadv_20150319.txt",
			"refsource": "CONFIRM",
			"tags": [
				"Vendor Advisory"
			]
		},
		{
			"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202410",
			"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1202410",
			"refsource": "CONFIRM",
			"tags": [
				"Issue Tracking",
				"Third Party Advisory"
			]
		},
		{
			"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=e1b568dd2462f7cacf98f3d117936c34e2849a6b",
			"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=e1b568dd2462f7cacf98f3d117936c34e2849a6b",
			"refsource": "CONFIRM",
			"tags": [
				"Vendor Advisory"
			]
		},
		{
			"url": "http://www.securitytracker.com/id/1031929",
			"name": "1031929",
			"refsource": "SECTRACK",
			"tags": [
				"Third Party Advisory",
				"VDB Entry"
			]
		},
		{
			"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
			"name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
			"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://bto.bluecoat.com/security-advisory/sa92",
			"name": "https://bto.bluecoat.com/security-advisory/sa92",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
			"name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "http://marc.info/?l=bugtraq&m=144050297101809&w=2",
			"name": "HPSBMU03397",
			"refsource": "HP",
			"tags": [
				"Mailing List",
				"Third Party Advisory"
			]
		},
		{
			"url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2",
			"name": "HPSBMU03380",
			"refsource": "HP",
			"tags": [
				"Mailing List",
				"Third Party Advisory"
			]
		},
		{
			"url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2",
			"name": "HPSBMU03409",
			"refsource": "HP",
			"tags": [
				"Mailing List",
				"Third Party Advisory"
			]
		},
		{
			"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
			"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "http://www.securityfocus.com/bid/73234",
			"name": "73234",
			"refsource": "BID",
			"tags": [
				"Third Party Advisory",
				"VDB Entry"
			]
		},
		{
			"url": "http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015",
			"name": "http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://security.gentoo.org/glsa/201503-11",
			"name": "GLSA-201503-11",
			"refsource": "GENTOO",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10110",
			"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10110",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
			"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
			"refsource": "CONFIRM",
			"tags": [
				"Patch",
				"Third Party Advisory"
			]
		},
		{
			"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
			"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
			"refsource": "CONFIRM",
			"tags": []
		}
	],
	"impact": {
		"baseMetricV2": {
			"cvssV2": {
				"version": "2.0",
				"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
				"accessVector": "NETWORK",
				"accessComplexity": "MEDIUM",
				"authentication": "NONE",
				"confidentialityImpact": "PARTIAL",
				"integrityImpact": "NONE",
				"availabilityImpact": "NONE",
				"baseScore": 4.3
			},
			"severity": "MEDIUM",
			"exploitabilityScore": 8.6,
			"impactScore": 2.9,
			"obtainAllPrivilege": false,
			"obtainUserPrivilege": false,
			"obtainOtherPrivilege": false,
			"userInteractionRequired": false
		}
	},
	"problem_type": "CWE-310"
}