First published: Mon Mar 16 2015(Updated: )
The ssl3_client_hello function in s3_clnt.c in OpenSSL 1.0.2 before 1.0.2a does not ensure that the PRNG is seeded before proceeding with a handshake, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and then conducting a brute-force attack.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.0.2 | 1.0.2 |
OpenSSL libcrypto | =1.0.2 | |
OpenSSL libcrypto | =1.0.2-beta1 | |
OpenSSL libcrypto | =1.0.2-beta2 | |
OpenSSL libcrypto | =1.0.2-beta3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0285 is considered a high-severity vulnerability due to the potential exposure of sensitive data through insufficient PRNG seeding.
To fix CVE-2015-0285, you should upgrade OpenSSL to version 1.0.2a or later.
CVE-2015-0285 may allow attackers to conduct brute-force attacks on encrypted communications due to weak randomness in cryptographic operations.
CVE-2015-0285 affects users of OpenSSL versions 1.0.2 and earlier, as well as beta releases of 1.0.2.
Yes, CVE-2015-0285 can be exploited remotely by attackers if the vulnerable OpenSSL version is used in network applications.