CVE-2015-3196

ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (race condition and double free) via a crafted ServerKeyExchange message.
Race Condition
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 91%
VendorProductVersion
hpicewall_sso
10.0
hpicewall_sso_agent_option
10.0
opensslopenssl
1.0.0
opensslopenssl
1.0.0a:a
opensslopenssl
1.0.0b:b
opensslopenssl
1.0.0c:c
opensslopenssl
1.0.0d:d
opensslopenssl
1.0.0e:e
opensslopenssl
1.0.0f:f
opensslopenssl
1.0.0g:g
opensslopenssl
1.0.0h:h
opensslopenssl
1.0.0i:i
opensslopenssl
1.0.0j:j
opensslopenssl
1.0.0k:k
opensslopenssl
1.0.0l:l
opensslopenssl
1.0.0m:m
opensslopenssl
1.0.0n:n
opensslopenssl
1.0.0o:o
opensslopenssl
1.0.0p:p
opensslopenssl
1.0.0q:q
opensslopenssl
1.0.0r:r
opensslopenssl
1.0.0s:s
opensslopenssl
1.0.1
opensslopenssl
1.0.1a:a
opensslopenssl
1.0.1b:b
opensslopenssl
1.0.1c:c
opensslopenssl
1.0.1d:d
opensslopenssl
1.0.1e:e
opensslopenssl
1.0.1f:f
opensslopenssl
1.0.1g:g
opensslopenssl
1.0.1h:h
opensslopenssl
1.0.1i:i
opensslopenssl
1.0.1j:j
opensslopenssl
1.0.1k:k
opensslopenssl
1.0.1l:l
opensslopenssl
1.0.1m:m
opensslopenssl
1.0.1n:n
opensslopenssl
1.0.1o:o
oraclevm_virtualbox
4.3.0 ≤
𝑥
≤ 4.3.35
oraclevm_virtualbox
5.0.0 ≤
𝑥
≤ 5.0.13
redhatenterprise_linux_desktop
6.0
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_server
6.0
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_aus
7.2
redhatenterprise_linux_server_aus
7.3
redhatenterprise_linux_server_aus
7.4
redhatenterprise_linux_server_eus
6.7
redhatenterprise_linux_server_eus
7.2
redhatenterprise_linux_server_eus
7.3
redhatenterprise_linux_server_eus
7.4
redhatenterprise_linux_server_eus
7.5
redhatenterprise_linux_server_eus
7.6
redhatenterprise_linux_server_tus
7.2
redhatenterprise_linux_server_tus
7.3
redhatenterprise_linux_server_tus
7.6
redhatenterprise_linux_workstation
6.0
redhatenterprise_linux_workstation
7.0
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
15.04
canonicalubuntu_linux
15.10
debiandebian_linux
7.0
debiandebian_linux
8.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssl
bullseye
1.1.1w-0+deb11u1
fixed
squeeze
not-affected
bullseye (security)
1.1.1w-0+deb11u2
fixed
bookworm
3.0.14-1~deb12u1
fixed
bookworm (security)
3.0.14-1~deb12u2
fixed
sid
3.3.2-2
fixed
trixie
3.3.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openssl
wily
not-affected
vivid
Fixed 1.0.1f-1ubuntu11.5
released
trusty
Fixed 1.0.1f-1ubuntu2.16
released
precise
Fixed 1.0.1-4ubuntu5.32
released
openssl098
wily
dne
vivid
not-affected
trusty
dne
precise
not-affected
References