CVE-2015-3194
high-risk
Published 2015-12-06
crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.
Do I need to act?
!
51.9% chance of exploitation in next 30 days
EPSS score — higher than 48% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (20)
References (76)
Third Party Advisory
http://fortiguard.com/advisory/openssl-advisory-december-2015
Third Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
Third Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
Mailing List
http://marc.info/?l=bugtraq&m=145382583417444&w=2
Vendor Advisory
http://openssl.org/news/secadv/20151203.txt
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-2617.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2957.html
Third Party Advisory
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20...
Third Party Advisory
http://www.debian.org/security/2015/dsa-3413
Third Party Advisory
http://www.fortiguard.com/advisory/openssl-advisory-december-2015
and 56 more references
66
/ 100
high-risk
Severity
26/34 · High
Exploitability
18/34 · Moderate
Exposure
22/34 · High