CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
99.3%
Debian Security Advisory DSA-3197-2 [email protected]
http://www.debian.org/security/ Salvatore Bonaccorso
March 24, 2015 http://www.debian.org/security/faq
Package : openssl
CVE ID : CVE-2015-0209 CVE-2015-0286 CVE-2015-0287 CVE-2015-0288
CVE-2015-0289 CVE-2015-0292
Debian Bug : 781081
The openssl update issued as DSA 3197-1 caused regressions. This update
reverts the defective patch applied in that update causing these
problems. Additionally a follow-up fix for CVE-2015-0209 is applied.
For reference the original advisory text follows.
Multiple vulnerabilities have been discovered in OpenSSL, a Secure
Sockets Layer toolkit. The Common Vulnerabilities and Exposures project
identifies the following issues:
CVE-2015-0286
Stephen Henson discovered that the ASN1_TYPE_cmp() function
can be crashed, resulting in denial of service.
CVE-2015-0287
Emilia Kaesper discovered a memory corruption in ASN.1 parsing.
CVE-2015-0289
Michal Zalewski discovered a NULL pointer dereference in the
PKCS#7 parsing code, resulting in denial of service.
CVE-2015-0292
It was discovered that missing input sanitising in base64 decoding
might result in memory corruption.
CVE-2015-0209
It was discovered that a malformed EC private key might result in
memory corruption.
CVE-2015-0288
It was discovered that missing input sanitising in the
X509_to_X509_REQ() function might result in denial of service.
For the stable distribution (wheezy), these problems have been fixed in
version 1.0.1e-2+deb7u16.
We recommend that you upgrade your openssl packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | kfreebsd-i386 | openssl | < 1.0.1e-2+deb7u15 | openssl_1.0.1e-2+deb7u15_kfreebsd-i386.deb |
Debian | 7 | i386 | libcrypto1.0.0-udeb | < 1.0.1e-2+deb7u15 | libcrypto1.0.0-udeb_1.0.1e-2+deb7u15_i386.deb |
Debian | 7 | armhf | libssl-dev | < 1.0.1e-2+deb7u16 | libssl-dev_1.0.1e-2+deb7u16_armhf.deb |
Debian | 7 | s390x | libssl1.0.0 | < 1.0.1e-2+deb7u16 | libssl1.0.0_1.0.1e-2+deb7u16_s390x.deb |
Debian | 7 | i386 | openssl | < 1.0.1e-2+deb7u16 | openssl_1.0.1e-2+deb7u16_i386.deb |
Debian | 7 | armhf | libssl1.0.0-dbg | < 1.0.1e-2+deb7u16 | libssl1.0.0-dbg_1.0.1e-2+deb7u16_armhf.deb |
Debian | 7 | powerpc | libssl-dev | < 1.0.1e-2+deb7u16 | libssl-dev_1.0.1e-2+deb7u16_powerpc.deb |
Debian | 7 | sparc | libssl-dev | < 1.0.1e-2+deb7u16 | libssl-dev_1.0.1e-2+deb7u16_sparc.deb |
Debian | 7 | kfreebsd-i386 | libssl-dev | < 1.0.1e-2+deb7u16 | libssl-dev_1.0.1e-2+deb7u16_kfreebsd-i386.deb |
Debian | 7 | amd64 | openssl | < 1.0.1e-2+deb7u16 | openssl_1.0.1e-2+deb7u16_amd64.deb |