CVE Vulnerabilities

CVE-2015-3194

NULL Pointer Dereference

Published: Dec 06, 2015 | Modified: Apr 12, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
5.8 LOW
AV:N/AC:M/Au:N/C:P/I:P/A:N
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
OpensslOpenssl1.0.1 (including)1.0.1 (including)
OpensslOpenssl1.0.1a (including)1.0.1a (including)
OpensslOpenssl1.0.1b (including)1.0.1b (including)
OpensslOpenssl1.0.1c (including)1.0.1c (including)
OpensslOpenssl1.0.1d (including)1.0.1d (including)
OpensslOpenssl1.0.1e (including)1.0.1e (including)
OpensslOpenssl1.0.1f (including)1.0.1f (including)
OpensslOpenssl1.0.1g (including)1.0.1g (including)
OpensslOpenssl1.0.1h (including)1.0.1h (including)
OpensslOpenssl1.0.1i (including)1.0.1i (including)
OpensslOpenssl1.0.1j (including)1.0.1j (including)
OpensslOpenssl1.0.1k (including)1.0.1k (including)
OpensslOpenssl1.0.1l (including)1.0.1l (including)
OpensslOpenssl1.0.1m (including)1.0.1m (including)
OpensslOpenssl1.0.1n (including)1.0.1n (including)
OpensslOpenssl1.0.1o (including)1.0.1o (including)
OpensslOpenssl1.0.1p (including)1.0.1p (including)
OpensslOpenssl1.0.2 (including)1.0.2 (including)
OpensslOpenssl1.0.2a (including)1.0.2a (including)
OpensslOpenssl1.0.2b (including)1.0.2b (including)
OpensslOpenssl1.0.2c (including)1.0.2c (including)
OpensslOpenssl1.0.2d (including)1.0.2d (including)
Red Hat Enterprise Linux 6RedHatopenssl-0:1.0.1e-42.el6_7.1*
Red Hat Enterprise Linux 7RedHatopenssl-1:1.0.1e-51.el7_2.1*
Text-Only JBCSRedHat*
OpensslUbuntudevel*
OpensslUbuntuesm-infra-legacy/trusty*
OpensslUbuntuprecise*
OpensslUbuntutrusty*
OpensslUbuntutrusty/esm*
OpensslUbuntuupstream*
OpensslUbuntuvivid*
OpensslUbuntuvivid/stable-phone-overlay*
OpensslUbuntuvivid/ubuntu-core*
OpensslUbuntuwily*

Potential Mitigations

References