CVE-2015-3195

MEDIUM
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.

References

http://fortiguard.com/advisory/openssl-advisory-december-2015

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761

http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html

http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173801.html

http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html

http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html

http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html

http://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html

http://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html

http://lists.opensuse.org/opensuse-updates/2015-12/msg00087.html

http://lists.opensuse.org/opensuse-updates/2015-12/msg00103.html

http://marc.info/?l=bugtraq&m=145382583417444&w=2

http://openssl.org/news/secadv/20151203.txt

http://rhn.redhat.com/errata/RHSA-2015-2616.html

http://rhn.redhat.com/errata/RHSA-2015-2617.html

http://rhn.redhat.com/errata/RHSA-2016-2056.html

http://rhn.redhat.com/errata/RHSA-2016-2957.html

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-openssl

http://www.debian.org/security/2015/dsa-3413

http://www.fortiguard.com/advisory/openssl-advisory-december-2015

http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html

http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html

http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html

http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html

http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html

http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html

http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html

http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

http://www.securityfocus.com/bid/78626

http://www.securityfocus.com/bid/91787

http://www.securitytracker.com/id/1034294

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.754583

http://www.ubuntu.com/usn/USN-2830-1

https://git.openssl.org/?p=openssl.git;a=commit;h=cc598f321fbac9c04da5766243ed55d55948637d

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944173

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322

https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100

https://support.apple.com/HT206167

Details

Source: MITRE

Published: 2015-12-06

Updated: 2021-01-19

Type: CWE-200

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 5.3

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Impact Score: 1.4

Exploitability Score: 3.9

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:oracle:api_gateway:11.1.2.3.0:*:*:*:*:*:*:*

cpe:2.3:a:oracle:api_gateway:11.1.2.4.0:*:*:*:*:*:*:*

cpe:2.3:a:oracle:communications_webrtc_session_controller:7.0:*:*:*:*:*:*:*

cpe:2.3:a:oracle:communications_webrtc_session_controller:7.1:*:*:*:*:*:*:*

cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2:*:*:*:*:*:*:*

cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*

cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*

cpe:2.3:a:oracle:http_server:11.5.10.2:*:*:*:*:*:*:*

cpe:2.3:a:oracle:life_sciences_data_hub:2.1:*:*:*:*:*:*:*

cpe:2.3:a:oracle:sun_ray_software:11.1:*:*:*:*:*:*:*

cpe:2.3:a:oracle:transportation_management:6.1:*:*:*:*:*:*:*

cpe:2.3:a:oracle:transportation_management:6.2:*:*:*:*:*:*:*

cpe:2.3:a:oracle:vm_server:3.2:*:*:*:*:*:x86:*

cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*

cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*

cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:* versions from 3.0 to 4.0.4 (inclusive)

cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*

cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*

cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*

cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*

cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*

Configuration 6

OR

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 7

OR

cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*

cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*

cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*

cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*

Configuration 8

OR

cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*

Tenable Plugins

View all (55 total)

IDNameProductFamilySeverity
128913EulerOS 2.0 SP2 : openssl098e (EulerOS-SA-2019-1861)NessusHuawei Local Security Checks
critical
106498pfSense < 2.2.6 Multiple Vulnerabilities (SA-15_09 / SA-15_10 / SA-15_11)NessusFirewalls
critical
96316Juniper Junos Multiple OpenSSL Vulnerabilities (JSA10759) (SWEET32)NessusJunos Local Security Checks
critical
93410Blue Coat ProxyAV 3.5.x < 3.5.4.1 Multiple DoS VulnerabilitiesNessusCGI abuses
medium
93383Juniper ScreenOS 6.3.x < 6.3.0r22 Multiple Vulnerabilities in OpenSSL (JSA10733)NessusFirewalls
medium
91751OracleVM 3.2 : openssl (OVMSA-2016-0071)NessusOracleVM Local Security Checks
high
9327Mac OS X 10.11.x < 10.11.4 Multiple VulnerabilitiesNessus Network MonitorOperating System Detection
critical
91274openSUSE Security Update : libressl (openSUSE-2016-604)NessusSuSE Local Security Checks
critical
91222HP System Management Homepage Multiple Vulnerabilities (HPSBMU03593)NessusWeb Servers
critical
91201F5 Networks BIG-IP : OpenSSL vulnerability (K12824341)NessusF5 Networks Local Security Checks
medium
91154OracleVM 3.3 / 3.4 : openssl (OVMSA-2016-0049) (SLOTH)NessusOracleVM Local Security Checks
critical
90833Oracle MySQL 5.7.x < 5.7.11 Multiple Vulnerabilities (April 2016 CPU) (July 2016 CPU)NessusDatabases
medium
90831Oracle MySQL 5.6.x < 5.6.29 Multiple Vulnerabilities (April 2016 CPU)NessusDatabases
medium
90680Oracle VM VirtualBox < 4.3.36 / 5.0.18 Multiple Vulnerabilities (April 2016 CPU)NessusMisc.
medium
9259Oracle MySQL 5.5.x < 5.5.48 / 5.6.x < 5.6.29 / 5.7.x < 5.7.11 Multiple VulnerabilitiesNessus Network MonitorDatabase
medium
90096Mac OS X 10.11.x < 10.11.4 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
89731SUSE SLES10 Security Update : OpenSSL (SUSE-SU-2016:0678-1) (DROWN)NessusSuSE Local Security Checks
critical
89651openSUSE Security Update : libopenssl0_9_8 (openSUSE-2016-294) (DROWN) (FREAK) (POODLE)NessusSuSE Local Security Checks
critical
89431Fedora 22 : openssl-1.0.1k-13.fc22 (2015-d87d60b9a9)NessusFedora Local Security Checks
high
89256Fedora 23 : openssl-1.0.2e-1.fc23 (2015-605de37b7f)NessusFedora Local Security Checks
high
88698MySQL Enterprise Server 5.6.x < 5.6.29 / 5.7.x < 5.7.11 OpenSSL Multiple VulnerabilitiesNessusDatabases
medium
88586GLSA-201601-05 : OpenSSL: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
88101Mac OS X : Cisco AnyConnect Secure Mobility Client < 3.1.13015.0 / 4.2.x < 4.2.1035.0 Multiple OpenSSL VulnerabilitiesNessusMacOS X Local Security Checks
medium
88100Cisco AnyConnect Secure Mobility Client < 3.1.13015.0 / 4.2.x < 4.2.1035.0 Multiple OpenSSL VulnerabilitiesNessusWindows
medium
88085AIX OpenSSL Advisory : openssl_advisory15.ascNessusAIX Local Security Checks
medium
88042Oracle E-Business Multiple Vulnerabilities (January 2016 CPU)NessusMisc.
medium
87800OracleVM 3.3 : openssl (OVMSA-2016-0001) (SLOTH)NessusOracleVM Local Security Checks
high
87654SUSE SLED12 / SLES12 Security Update : compat-openssl098 (SUSE-SU-2015:2342-1)NessusSuSE Local Security Checks
medium
87619openSUSE Security Update : compat-openssl098 (openSUSE-2015-940)NessusSuSE Local Security Checks
medium
87518openSUSE Security Update : libressl (openSUSE-2015-916)NessusSuSE Local Security Checks
high
87487openSUSE Security Update : openssl (openSUSE-2015-911)NessusSuSE Local Security Checks
high
87461SUSE SLED11 / SLES11 Security Update : openssl (SUSE-SU-2015:2275-1)NessusSuSE Local Security Checks
medium
87447openSUSE Security Update : OpenSSL (openSUSE-2015-908)NessusSuSE Local Security Checks
high
87402Scientific Linux Security Update : openssl on SL6.x i386/x86_64 (20151214)NessusScientific Linux Local Security Checks
high
87401Scientific Linux Security Update : openssl on SL5.x i386/x86_64 (20151214)NessusScientific Linux Local Security Checks
medium
87378Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : openssl (SSA:2015-349-04)NessusSlackware Local Security Checks
high
87366OracleVM 3.3 : openssl (OVMSA-2015-0155)NessusOracleVM Local Security Checks
high
87364Oracle Linux 6 / 7 : openssl (ELSA-2015-2617)NessusOracle Linux Local Security Checks
high
87363Oracle Linux 5 : openssl (ELSA-2015-2616)NessusOracle Linux Local Security Checks
medium
87357CentOS 6 / 7 : openssl (CESA-2015:2617)NessusCentOS Local Security Checks
high
87356CentOS 5 : openssl (CESA-2015:2616)NessusCentOS Local Security Checks
medium
87340Amazon Linux AMI : openssl (ALAS-2015-614)NessusAmazon Linux Local Security Checks
high
87338SUSE SLED11 Security Update : compat-openssl097g (SUSE-SU-2015:2251-1)NessusSuSE Local Security Checks
medium
87335RHEL 6 / 7 : openssl (RHSA-2015:2617)NessusRed Hat Local Security Checks
high
87334RHEL 5 : openssl (RHSA-2015:2616)NessusRed Hat Local Security Checks
medium
87318SUSE SLED12 / SLES12 Security Update : openssl (SUSE-SU-2015:2237-1)NessusSuSE Local Security Checks
high
87280SUSE SLED12 / SLES12 Security Update : openssl (SUSE-SU-2015:2230-1)NessusSuSE Local Security Checks
high
87236Ubuntu 12.04 LTS / 14.04 LTS / 15.04 / 15.10 : openssl vulnerabilities (USN-2830-1)NessusUbuntu Local Security Checks
high
87222OpenSSL 1.0.2 < 1.0.2e Multiple VulnerabilitiesNessusWeb Servers
medium
87221OpenSSL 1.0.1 < 1.0.1q Multiple DoSNessusWeb Servers
medium
87220OpenSSL 1.0.0 < 1.0.0t Multiple DoSNessusWeb Servers
medium
87219OpenSSL 0.9.8 < 0.9.8zh X509_ATTRIBUTE Memory Leak DoSNessusWeb Servers
medium
87213FreeBSD : openssl -- multiple vulnerabilities (4c8d1d72-9b38-11e5-aece-d050996490d0)NessusFreeBSD Local Security Checks
high
87212Debian DSA-3413-1 : openssl - security updateNessusDebian Local Security Checks
high
87186Debian DLA-358-1 : openssl security updateNessusDebian Local Security Checks
medium