Lucene search

K
f5F5F5:K16904
HistoryJul 17, 2015 - 12:00 a.m.

K16904 : OpenSSL ssleay_rand_byte(s) regression CVE-2015-3216

2015-07-1700:00:00
my.f5.com
23

7.3 High

AI Score

Confidence

High

0.121 Low

EPSS

Percentile

95.4%

Security Advisory Description

Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.
(
CVE-2015-3216
)
Impact
None. F5 products are not affected by this vulnerability.

7.3 High

AI Score

Confidence

High

0.121 Low

EPSS

Percentile

95.4%