CVE-2015-0208
HP Security Bulletin HPSBMU03380 1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The ASN.1 signature-verification implementation in the rsa_item_verify function in crypto/rsa/rsa_ameth.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted RSA PSS parameters to an endpoint that uses the certificate-verification feature.
La implementación de verificación de firma ASN.1 en la función rsa_item_verify en crypto/rsa/rsa_ameth.c en OpenSSL 1.0.2 anterior a 1.0.2a permite a atacantes remotos causar una denegación de servicio (referencia puntero NULO y caída de la aplicación) a través de parámetros modificados RSA PSS a un endpoint que usa la característica de verificación de certificado.
Multiple potential security vulnerabilities have been identified with HP System Management Homepage (SMH) on Linux and Windows. The vulnerabilities could be exploited remotely resulting in Denial of Service (DoS), Cross-site Request Forgery (CSRF), execution of arbitrary code, unauthorized modification, unauthorized access, or disclosure of information. Revision 1 of this advisory.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-11-18 CVE Reserved
- 2015-03-19 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (17)
URL | Tag | Source |
---|---|---|
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html | Third Party Advisory |
|
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html | Third Party Advisory |
|
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | Third Party Advisory |
|
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html | Third Party Advisory |
|
http://www.securityfocus.com/bid/73230 | Third Party Advisory | |
http://www.securitytracker.com/id/1031929 | Third Party Advisory | |
https://bto.bluecoat.com/security-advisory/sa92 | Third Party Advisory | |
https://bugzilla.redhat.com/show_bug.cgi?id=1202369 | Issue Tracking | |
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf |
|
|
https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=4b22cce3812052fe64fc3f6d58d8cc884e3cb834 | ||
https://kc.mcafee.com/corporate/index?page=content&id=SB10110 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html | 2023-11-07 |
URL | Date | SRC |
---|---|---|
http://marc.info/?l=bugtraq&m=143748090628601&w=2 | 2023-11-07 | |
http://marc.info/?l=bugtraq&m=144050155601375&w=2 | 2023-11-07 | |
http://marc.info/?l=bugtraq&m=144050297101809&w=2 | 2023-11-07 | |
https://security.gentoo.org/glsa/201503-11 | 2023-11-07 | |
https://www.openssl.org/news/secadv_20150319.txt | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Openssl Search vendor "Openssl" | Openssl Search vendor "Openssl" for product "Openssl" | 1.0.2 Search vendor "Openssl" for product "Openssl" and version "1.0.2" | - |
Affected
| ||||||
Openssl Search vendor "Openssl" | Openssl Search vendor "Openssl" for product "Openssl" | 1.0.2 Search vendor "Openssl" for product "Openssl" and version "1.0.2" | beta1 |
Affected
| ||||||
Openssl Search vendor "Openssl" | Openssl Search vendor "Openssl" for product "Openssl" | 1.0.2 Search vendor "Openssl" for product "Openssl" and version "1.0.2" | beta2 |
Affected
| ||||||
Openssl Search vendor "Openssl" | Openssl Search vendor "Openssl" for product "Openssl" | 1.0.2 Search vendor "Openssl" for product "Openssl" and version "1.0.2" | beta3 |
Affected
|