First published: Mon Mar 16 2015(Updated: )
A vulnerability existed in previous versions of OpenSSL related to the processing of base64-encoded data. Any code path that reads base64 data from an untrusted source could be affected (such as the PEM processing routines). Maliciously crafted base 64 data could trigger a segmenation fault or memory corruption. This was addressed in previous versions of OpenSSL but has not been included in any security advisory until now. This issue affects OpenSSL versions 1.0.1, 1.0.0, and 0.9.8. This issue is fixed in versions: 1.0.1h, 1.0.0m, and 0.9.8za. Acknowledgements: Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Robert Dugal and David Ramos as the original reporters.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.0.1 | 1.0.1 |
redhat/openssl | <0.9.8 | 0.9.8 |
OpenSSL | <=0.9.8z | |
OpenSSL | =1.0.0 | |
OpenSSL | =1.0.0a | |
OpenSSL | =1.0.0b | |
OpenSSL | =1.0.0c | |
OpenSSL | =1.0.0d | |
OpenSSL | =1.0.0e | |
OpenSSL | =1.0.0f | |
OpenSSL | =1.0.0g | |
OpenSSL | =1.0.0h | |
OpenSSL | =1.0.0i | |
OpenSSL | =1.0.0j | |
OpenSSL | =1.0.0k | |
OpenSSL | =1.0.0l | |
OpenSSL | =1.0.1 | |
OpenSSL | =1.0.1a | |
OpenSSL | =1.0.1b | |
OpenSSL | =1.0.1c | |
OpenSSL | =1.0.1d | |
OpenSSL | =1.0.1e | |
OpenSSL | =1.0.1f | |
OpenSSL | =1.0.1g |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0292 has been classified as a high severity vulnerability due to its potential to trigger segmentation faults from crafted base64 data.
To fix CVE-2015-0292, update OpenSSL to version 1.0.1 or later, or apply the relevant patches from your distribution.
CVE-2015-0292 affects OpenSSL versions 0.9.8 through 1.0.1, including all iterations of these versions.
CVE-2015-0292 can enable denial of service attacks through segmentation faults when processing maliciously crafted base64 data.
As of the last reports, there have been instances of CVE-2015-0292 being exploited in the wild, highlighting the need for prompt remediation.