CVE-2015-1793
09.07.2015, 19:17
The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certificate verifications via a valid leaf certificate.Enginsight
Vendor | Product | Version |
---|---|---|
oracle | supply_chain_products_suite | 6.1.2.2 |
oracle | supply_chain_products_suite | 6.1.3.0 |
oracle | supply_chain_products_suite | 6.2.0 |
oracle | jd_edwards_enterpriseone_tools | 9.1 |
oracle | jd_edwards_enterpriseone_tools | 9.2 |
openssl | openssl | 1.0.1n:n |
openssl | openssl | 1.0.1o:o |
openssl | openssl | 1.0.2b:b |
openssl | openssl | 1.0.2c:c |
oracle | opus_10g_ethernet_switch_family | 𝑥 ≤ 2.0.0.6 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration