Vulnerability CVE-2015-3195


Published: 2015-12-06

Description:
The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.

Type:

CWE-200

(Information Exposure)

Vendor: Debian
Product: Debian linux 
Version: 8.0; 7.0;
Vendor: Redhat
Product: Enterprise linux server tus 
Version:
7.6
7.3
7.2
See more versions on NVD
Product: Enterprise linux server eus 
Version:
7.6
7.5
7.4
7.3
7.2
6.7
See more versions on NVD
Product: Enterprise linux server aus 
Version:
7.4
7.3
7.2
See more versions on NVD
Product: Enterprise linux server 
Version:
7.0
6.0
5.0
See more versions on NVD
Product: Enterprise linux desktop 
Version:
7.0
6.0
5.0
See more versions on NVD
Product: Enterprise linux workstation 
Version:
7.0
6.0
5.0
See more versions on NVD
Vendor: Oracle
Product: Transportation management 
Version: 6.2; 6.1;
Product: Vm virtualbox 
Version:
5.0.8
5.0.6
5.0.4
5.0.2
5.0.14
5.0.13
5.0.12
5.0.10
5.0.0
4.3.8
4.3.6
4.3.4
4.3.36
4.3.35
4.3.34
4.3.32
4.3.30
4.3.29
4.3.28
4.3.26
4.3.24
4.3.22
4.3.2
4.3.18
4.3.16
4.3.14
4.3.12
4.3.10
4.3.0
See more versions on NVD
Product: Life sciences data hub 
Version: 2.1;
Product: Exalogic infrastructure 
Version: 2.0;
Product: Api gateway 
Version: 11.1.2.4.0; 11.1.2.3.0;
Product: Sun ray software 
Version: 11.1;
Vendor: Canonical
Product: Ubuntu linux 
Version:
15.10
15.04
14.04
12.04
See more versions on NVD
Vendor: Apple
Product: Mac os x 
Version: 10.11.3;
Vendor: Openssl
Product: Openssl 
Version:
1.0.2d
1.0.2c
1.0.2b
1.0.2a
1.0.2
1.0.1p
1.0.1o
1.0.1n
1.0.1m
1.0.1l
1.0.1k
1.0.1j
1.0.1i
1.0.1h
1.0.1g
1.0.1f
1.0.1e
1.0.1d
1.0.1c
1.0.1b
1.0.1a
1.0.0s
1.0.0r
1.0.0q
1.0.0p
1.0.0o
1.0.0n
1.0.0m
1.0.0l
1.0.0k
1.0.0j
1.0.0i
1.0.0h
1.0.0g
1.0.0f
1.0.0e
See more versions on NVD

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial

 References:
http://fortiguard.com/advisory/openssl-advisory-december-2015
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173801.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html
http://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html
http://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html
http://lists.opensuse.org/opensuse-updates/2015-12/msg00087.html
http://lists.opensuse.org/opensuse-updates/2015-12/msg00103.html
http://marc.info/?l=bugtraq&m=145382583417444&w=2
http://openssl.org/news/secadv/20151203.txt
http://rhn.redhat.com/errata/RHSA-2015-2616.html
http://rhn.redhat.com/errata/RHSA-2015-2617.html
http://rhn.redhat.com/errata/RHSA-2016-2056.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-openssl
http://www.debian.org/security/2015/dsa-3413
http://www.fortiguard.com/advisory/openssl-advisory-december-2015
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/78626
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1034294
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.754583
http://www.ubuntu.com/usn/USN-2830-1
https://git.openssl.org/?p=openssl.git;a=commit;h=cc598f321fbac9c04da5766243ed55d55948637d
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944173
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100
https://support.apple.com/HT206167

Related CVE
CVE-2019-1563
In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decryp...
CVE-2019-1549
OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in order to ensure that the parent and child processes did not share the same RNG state. However this pro...
CVE-2019-1547
Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those case...
CVE-2019-1552
OpenSSL has internal defaults for a directory tree where it can find a configuration file as well as certificates used for verification in TLS. This directory is most commonly referred to as OPENSSLDIR, and is configurable with the --prefix / --opens...
CVE-2019-1543
ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 b...
CVE-2019-1559
If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid...
CVE-2019-0190
A bug exists in the way mod_ssl handled client renegotiations. A remote attacker could send a carefully crafted request that would cause mod_ssl to enter a loop leading to a denial of service. This bug can be only triggered with Apache HTTP Server ve...
CVE-2018-5407
Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.

Copyright 2019, cxsecurity.com

 

Back to Top