First published: Mon Mar 16 2015(Updated: )
The ASN.1 signature-verification implementation in the rsa_item_verify function in crypto/rsa/rsa_ameth.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted RSA PSS parameters to an endpoint that uses the certificate-verification feature.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.0.2 | 1.0.2 |
OpenSSL libcrypto | =1.0.2 | |
OpenSSL libcrypto | =1.0.2-beta1 | |
OpenSSL libcrypto | =1.0.2-beta2 | |
OpenSSL libcrypto | =1.0.2-beta3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0208 has a severity of medium due to its potential to cause denial of service through a crash.
To fix CVE-2015-0208, upgrade to OpenSSL version 1.0.2a or later.
CVE-2015-0208 affects OpenSSL versions 1.0.2 and all its beta versions prior to 1.0.2a.
Yes, CVE-2015-0208 can be exploited remotely by sending crafted RSA PSS parameters.
Applications using vulnerable versions of OpenSSL may experience crashes due to NULL pointer dereference.