CVE Vulnerabilities

CVE-2015-0288

Published: Mar 19, 2015 | Modified: Nov 07, 2023
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
2.6 LOW
AV:N/AC:H/Au:N/C:N/I:N/A:P
RedHat/V3
Ubuntu
LOW

The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.

Affected Software

Name Vendor Start Version End Version
Openssl Openssl * 0.9.8ze (including)
Openssl Openssl 1.0.0 (including) 1.0.0 (including)
Openssl Openssl 1.0.0a (including) 1.0.0a (including)
Openssl Openssl 1.0.0b (including) 1.0.0b (including)
Openssl Openssl 1.0.0c (including) 1.0.0c (including)
Openssl Openssl 1.0.0d (including) 1.0.0d (including)
Openssl Openssl 1.0.0e (including) 1.0.0e (including)
Openssl Openssl 1.0.0f (including) 1.0.0f (including)
Openssl Openssl 1.0.0g (including) 1.0.0g (including)
Openssl Openssl 1.0.0h (including) 1.0.0h (including)
Openssl Openssl 1.0.0i (including) 1.0.0i (including)
Openssl Openssl 1.0.0j (including) 1.0.0j (including)
Openssl Openssl 1.0.0k (including) 1.0.0k (including)
Openssl Openssl 1.0.0l (including) 1.0.0l (including)
Openssl Openssl 1.0.0m (including) 1.0.0m (including)
Openssl Openssl 1.0.0n (including) 1.0.0n (including)
Openssl Openssl 1.0.0o (including) 1.0.0o (including)
Openssl Openssl 1.0.0p (including) 1.0.0p (including)
Openssl Openssl 1.0.0q (including) 1.0.0q (including)
Openssl Openssl 1.0.1 (including) 1.0.1 (including)
Openssl Openssl 1.0.1a (including) 1.0.1a (including)
Openssl Openssl 1.0.1b (including) 1.0.1b (including)
Openssl Openssl 1.0.1c (including) 1.0.1c (including)
Openssl Openssl 1.0.1d (including) 1.0.1d (including)
Openssl Openssl 1.0.1e (including) 1.0.1e (including)
Openssl Openssl 1.0.1f (including) 1.0.1f (including)
Openssl Openssl 1.0.1g (including) 1.0.1g (including)
Openssl Openssl 1.0.1h (including) 1.0.1h (including)
Openssl Openssl 1.0.1i (including) 1.0.1i (including)
Openssl Openssl 1.0.1j (including) 1.0.1j (including)
Openssl Openssl 1.0.1k (including) 1.0.1k (including)
Openssl Openssl 1.0.1l (including) 1.0.1l (including)
Openssl Openssl 1.0.2 (including) 1.0.2 (including)
Red Hat Enterprise Linux 5 RedHat openssl-0:0.9.8e-33.el5_11 *
Red Hat Enterprise Linux 6 RedHat openssl-0:1.0.1e-30.el6_6.7 *
Red Hat Enterprise Linux 7 RedHat openssl-1:1.0.1e-42.el7_1.4 *
Red Hat JBoss Web Server 3 for RHEL 6 RedHat mod_bmx-0:0.9.5-5.GA.ep7.el6 *
Red Hat JBoss Web Server 3 for RHEL 6 RedHat mod_cluster-0:1.3.1-8.Final_redhat_3.1.ep7.el6 *
Red Hat JBoss Web Server 3 for RHEL 6 RedHat mod_jk-0:1.2.40-8.redhat_1.ep7.el6 *
Red Hat JBoss Web Server 3 for RHEL 6 RedHat mod_security-jws3-0:2.8.0-6.GA.ep7.el6 *
Red Hat JBoss Web Server 3 for RHEL 6 RedHat tomcat7-0:7.0.59-26_patch_00.ep7.el6 *
Red Hat JBoss Web Server 3 for RHEL 6 RedHat tomcat8-0:8.0.18-25_patch_00.ep7.el6 *
Red Hat JBoss Web Server 3 for RHEL 7 RedHat mod_bmx-0:0.9.5-5.GA.ep7.el7 *
Red Hat JBoss Web Server 3 for RHEL 7 RedHat mod_cluster-0:1.3.1-8.Final_redhat_3.1.ep7.el7 *
Red Hat JBoss Web Server 3 for RHEL 7 RedHat mod_jk-0:1.2.40-8.redhat_1.ep7.el7 *
Red Hat JBoss Web Server 3 for RHEL 7 RedHat mod_security-jws3-0:2.8.0-6.GA.ep7.el7 *
Red Hat JBoss Web Server 3 for RHEL 7 RedHat tomcat7-0:7.0.59-26_patch_00.ep7.el7 *
Red Hat JBoss Web Server 3 for RHEL 7 RedHat tomcat8-0:8.0.18-25_patch_00.ep7.el7 *
Red Hat Storage 2.1 RedHat openssl-0:1.0.1e-30.el6_6.7 *
Openssl Ubuntu artful *
Openssl Ubuntu bionic *
Openssl Ubuntu cosmic *
Openssl Ubuntu devel *
Openssl Ubuntu disco *
Openssl Ubuntu lucid *
Openssl Ubuntu precise *
Openssl Ubuntu trusty *
Openssl Ubuntu utopic *
Openssl Ubuntu vivid *
Openssl Ubuntu vivid/stable-phone-overlay *
Openssl Ubuntu vivid/ubuntu-core *
Openssl Ubuntu wily *
Openssl Ubuntu xenial *
Openssl Ubuntu yakkety *
Openssl Ubuntu zesty *
Openssl098 Ubuntu precise *
Openssl098 Ubuntu trusty *
Openssl098 Ubuntu utopic *
Openssl098 Ubuntu vivid *

References