First published: Fri Jun 12 2015(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openssl | 1.1.1w-0+deb11u1 1.1.1n-0+deb11u5 3.0.14-1~deb12u1 3.0.14-1~deb12u2 3.3.2-1 | |
OpenSSL libcrypto | <=0.9.8zf | |
OpenSSL libcrypto | =1.0.0 | |
OpenSSL libcrypto | =1.0.0-beta1 | |
OpenSSL libcrypto | =1.0.0-beta2 | |
OpenSSL libcrypto | =1.0.0-beta3 | |
OpenSSL libcrypto | =1.0.0-beta4 | |
OpenSSL libcrypto | =1.0.0-beta5 | |
OpenSSL libcrypto | =1.0.0a | |
OpenSSL libcrypto | =1.0.0b | |
OpenSSL libcrypto | =1.0.0c | |
OpenSSL libcrypto | =1.0.0d | |
OpenSSL libcrypto | =1.0.0e | |
OpenSSL libcrypto | =1.0.0f | |
OpenSSL libcrypto | =1.0.0g | |
OpenSSL libcrypto | =1.0.0h | |
OpenSSL libcrypto | =1.0.0i | |
OpenSSL libcrypto | =1.0.0j | |
OpenSSL libcrypto | =1.0.0k | |
OpenSSL libcrypto | =1.0.0l | |
OpenSSL libcrypto | =1.0.0m | |
OpenSSL libcrypto | =1.0.0n | |
OpenSSL libcrypto | =1.0.0o | |
OpenSSL libcrypto | =1.0.0p | |
OpenSSL libcrypto | =1.0.0q | |
OpenSSL libcrypto | =1.0.0r | |
OpenSSL libcrypto | =1.0.1 | |
OpenSSL libcrypto | =1.0.1-beta1 | |
OpenSSL libcrypto | =1.0.1-beta2 | |
OpenSSL libcrypto | =1.0.1-beta3 | |
OpenSSL libcrypto | =1.0.1a | |
OpenSSL libcrypto | =1.0.1b | |
OpenSSL libcrypto | =1.0.1c | |
OpenSSL libcrypto | =1.0.1d | |
OpenSSL libcrypto | =1.0.1e | |
OpenSSL libcrypto | =1.0.1f | |
OpenSSL libcrypto | =1.0.1g | |
OpenSSL libcrypto | =1.0.1h | |
OpenSSL libcrypto | =1.0.1i | |
OpenSSL libcrypto | =1.0.1j | |
OpenSSL libcrypto | =1.0.1k | |
OpenSSL libcrypto | =1.0.1l | |
OpenSSL libcrypto | =1.0.1m | |
OpenSSL libcrypto | =1.0.2 | |
OpenSSL libcrypto | =1.0.2-beta1 | |
OpenSSL libcrypto | =1.0.2a | |
Oracle SPARC OPL Service Processor | <=1121 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1789 has a severity rating that indicates a denial of service risk due to an out-of-bounds read affecting certain versions of OpenSSL.
To fix CVE-2015-1789, update OpenSSL to version 0.9.8zg or newer, or to version 1.0.0s, 1.0.1n, or 1.0.2b and above.
CVE-2015-1789 affects various versions of OpenSSL including those prior to 0.9.8zg and specific 1.0.0, 1.0.1, and 1.0.2 versions.
CVE-2015-1789 can be exploited by remote attackers to cause a denial of service via a specially crafted length field.
No, CVE-2015-1789 is no longer a concern if systems are updated to the recommended versions of OpenSSL.