First published: Mon Mar 16 2015(Updated: )
If client authentication is used, then a server can crash with a segmentation fault in the event of a DHE ciphersuite being selected and a zero length ClientKeyExchange (CKE) message being sent by the client. This could be exploited in a denial of service attack. This issue affects OpenSSL version 1.0.2, and is fixed in version 1.0.2a. Acknowledgements: Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Matt Caswell of the OpenSSL development team as the original reporter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.0.2 | 1.0.2 |
OpenSSL libcrypto | =1.0.2 | |
OpenSSL libcrypto | =1.0.2-beta1 | |
OpenSSL libcrypto | =1.0.2-beta2 | |
OpenSSL libcrypto | =1.0.2-beta3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1787 has a severity rating that indicates it can lead to a denial of service attack due to server crashes.
To fix CVE-2015-1787, upgrade OpenSSL to version 1.0.2 or later.
CVE-2015-1787 affects OpenSSL versions 1.0.2, 1.0.2-beta1, 1.0.2-beta2, and 1.0.2-beta3.
CVE-2015-1787 can be exploited in a denial of service attack leading to service interruption.
The crash in CVE-2015-1787 is caused by a segmentation fault triggered when a zero length ClientKeyExchange message is sent by the client.