Vulnerability Description
ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (race condition and double free) via a crafted ServerKeyExchange message.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hp | Icewall Sso | 10.0 |
| Hp | Icewall Sso Agent Option | 10.0 |
| Openssl | Openssl | 1.0.0 |
| Oracle | Vm Virtualbox | >= 4.3.0, <= 4.3.35 |
| Fedoraproject | Fedora | 22 |
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Server Aus | 7.2 |
| Redhat | Enterprise Linux Server Eus | 6.7 |
| Redhat | Enterprise Linux Server Tus | 7.2 |
| Redhat | Enterprise Linux Workstation | 6.0 |
| Canonical | Ubuntu Linux | 12.04 |
| Debian | Debian Linux | 7.0 |
Related Weaknesses (CWE)
References
- http://fortiguard.com/advisory/openssl-advisory-december-2015Third Party Advisory
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759Third Party Advisory
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761Third Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173801.hMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00070.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00071.htmlMailing ListThird Party Advisory
- http://marc.info/?l=bugtraq&m=145382583417444&w=2Mailing ListThird Party Advisory
- http://openssl.org/news/secadv/20151203.txtVendor Advisory
- http://rhn.redhat.com/errata/RHSA-2015-2617.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2957.htmlThird Party Advisory
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20Third Party Advisory
- http://www.debian.org/security/2015/dsa-3413Third Party Advisory
- http://www.fortiguard.com/advisory/openssl-advisory-december-2015Third Party Advisory
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlPatchThird Party Advisory
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlPatchThird Party Advisory
FAQ
What is CVE-2015-3196?
CVE-2015-3196 is a vulnerability with a CVSS score of 4.3 (MEDIUM). ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which al...
How severe is CVE-2015-3196?
CVE-2015-3196 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-3196?
Check the references section above for vendor advisories and patch information. Affected products include: Hp Icewall Sso, Hp Icewall Sso Agent Option, Openssl Openssl, Oracle Vm Virtualbox, Fedoraproject Fedora.