MEDIUM · 4.3

CVE-2015-3216

Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and...

Vulnerability Description

Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.

CVSS Score

4.3

MEDIUM

AV:N/AC:M/Au:N/C:N/I:N/A:P
Confidentiality
NONE
Integrity
NONE
Availability
PARTIAL

Affected Products

VendorProductVersions
RedhatEnterprise Linux7.0
OpensslOpenssl1.0.1e-25.el7

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-3216?

CVE-2015-3216 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and...

How severe is CVE-2015-3216?

CVE-2015-3216 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-3216?

Check the references section above for vendor advisories and patch information. Affected products include: Redhat Enterprise Linux, Openssl Openssl.