CVE-2015-0291

The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.

Published at
2015-03-19T22:59Z
3334 days ago
Modified
2022-12-13T12:15Z
509 days ago
NVD-CWE-Other
Problem type

References


URLType
git.openssl.org
https://git.openssl.org/?p=openssl.git;a=commit;h=76343947ada960b6269090638f5391068daee88d
CONFIRM
www.openssl.org
https://www.openssl.org/news/secadv_20150319.txt
CONFIRM
bugzilla.redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1202338
CONFIRM
1031929
http://www.securitytracker.com/id/1031929
SECTRACK
www.oracle.com
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
CONFIRM
www.oracle.com
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
CONFIRM
bto.bluecoat.com
https://bto.bluecoat.com/security-advisory/sa92
CONFIRM
www.oracle.com
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
CONFIRM
HPSBMU03397
http://marc.info/?l=bugtraq&m=144050297101809&w=2
HP
HPSBMU03380
http://marc.info/?l=bugtraq&m=143748090628601&w=2
HP
HPSBMU03409
http://marc.info/?l=bugtraq&m=144050155601375&w=2
HP
www.oracle.com
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
CONFIRM
73235
http://www.securityfocus.com/bid/73235
BID
www.fortiguard.com
http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015
CONFIRM
GLSA-201503-11
https://security.gentoo.org/glsa/201503-11
GENTOO
kc.mcafee.com
https://kc.mcafee.com/corporate/index?page=content&id=SB10110
CONFIRM
www.oracle.com
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
CONFIRM
cert-portal.siemens.com
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
CONFIRM

GET https://vulnerabilitydata.com/api/details/CVE-2015-0291

{
	"id": "CVE-2015-0291",
	"published_date": "2015-03-19T22:59Z",
	"last_modified_date": "2022-12-13T12:15Z",
	"assigner": "secalert@redhat.com",
	"description": "The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.",
	"references": [
		{
			"url": "https://git.openssl.org/?p=openssl.git;a=commit;h=76343947ada960b6269090638f5391068daee88d",
			"name": "https://git.openssl.org/?p=openssl.git;a=commit;h=76343947ada960b6269090638f5391068daee88d",
			"refsource": "CONFIRM",
			"tags": [
				"Vendor Advisory"
			]
		},
		{
			"url": "https://www.openssl.org/news/secadv_20150319.txt",
			"name": "https://www.openssl.org/news/secadv_20150319.txt",
			"refsource": "CONFIRM",
			"tags": [
				"Vendor Advisory"
			]
		},
		{
			"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202338",
			"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1202338",
			"refsource": "CONFIRM",
			"tags": [
				"Issue Tracking"
			]
		},
		{
			"url": "http://www.securitytracker.com/id/1031929",
			"name": "1031929",
			"refsource": "SECTRACK",
			"tags": [
				"Third Party Advisory",
				"VDB Entry"
			]
		},
		{
			"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
			"name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
			"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://bto.bluecoat.com/security-advisory/sa92",
			"name": "https://bto.bluecoat.com/security-advisory/sa92",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
			"name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "http://marc.info/?l=bugtraq&m=144050297101809&w=2",
			"name": "HPSBMU03397",
			"refsource": "HP",
			"tags": [
				"Mailing List",
				"Third Party Advisory"
			]
		},
		{
			"url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2",
			"name": "HPSBMU03380",
			"refsource": "HP",
			"tags": [
				"Mailing List",
				"Third Party Advisory"
			]
		},
		{
			"url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2",
			"name": "HPSBMU03409",
			"refsource": "HP",
			"tags": [
				"Mailing List",
				"Third Party Advisory"
			]
		},
		{
			"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
			"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "http://www.securityfocus.com/bid/73235",
			"name": "73235",
			"refsource": "BID",
			"tags": [
				"Third Party Advisory",
				"VDB Entry"
			]
		},
		{
			"url": "http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015",
			"name": "http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://security.gentoo.org/glsa/201503-11",
			"name": "GLSA-201503-11",
			"refsource": "GENTOO",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10110",
			"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10110",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
			"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
			"refsource": "CONFIRM",
			"tags": [
				"Patch",
				"Third Party Advisory"
			]
		},
		{
			"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
			"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
			"refsource": "CONFIRM",
			"tags": []
		}
	],
	"impact": {
		"baseMetricV2": {
			"cvssV2": {
				"version": "2.0",
				"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
				"accessVector": "NETWORK",
				"accessComplexity": "LOW",
				"authentication": "NONE",
				"confidentialityImpact": "NONE",
				"integrityImpact": "NONE",
				"availabilityImpact": "PARTIAL",
				"baseScore": 5
			},
			"severity": "MEDIUM",
			"exploitabilityScore": 10,
			"impactScore": 2.9,
			"obtainAllPrivilege": false,
			"obtainUserPrivilege": false,
			"obtainOtherPrivilege": false,
			"userInteractionRequired": false
		}
	},
	"problem_type": "NVD-CWE-Other"
}