First published: Thu Dec 03 2015(Updated: )
A memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and CMS data. A remote attacker could use this flaw to cause an application that parses PKCS#7 or CMS data from untrusted sources to use an excessive amount of memory and possibly crash.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <0.9.8 | 0.9.8 |
redhat/openssl | <1.0.0 | 1.0.0 |
redhat/openssl | <1.0.2 | 1.0.2 |
redhat/openssl | <0:0.9.8e-37.el5_11 | 0:0.9.8e-37.el5_11 |
redhat/openssl | <0:1.0.1e-42.el6_7.1 | 0:1.0.1e-42.el6_7.1 |
redhat/openssl | <1:1.0.1e-51.el7_2.1 | 1:1.0.1e-51.el7_2.1 |
macOS Yosemite | <10.11.4 | |
Oracle API Gateway | =11.1.2.3.0 | |
Oracle API Gateway | =11.1.2.4.0 | |
Oracle WebRTC Session Controller | =7.0 | |
Oracle WebRTC Session Controller | =7.1 | |
Oracle WebRTC Session Controller | =7.2 | |
Oracle Exalogic Infrastructure | =1.0 | |
Oracle Exalogic Infrastructure | =2.0 | |
Oracle HTTP Server | =11.5.10.2 | |
Oracle Life Sciences Data Hub | =2.1 | |
Oracle Sun Ray Software | =11.1 | |
Oracle Transportation Management | =6.1 | |
Oracle Transportation Management | =6.2 | |
Oracle VM Server | =3.2 | |
Oracle VM VirtualBox | <4.3.36 | |
Oracle VM VirtualBox | >=5.0.0<5.0.14 | |
Oracle Integrated Lights Out Manager Firmware | >=3.0<=4.0.4 | |
Oracle Linux | =5 | |
Oracle Linux | =6 | |
Oracle Linux | =7 | |
Oracle Solaris SPARC | =10 | |
Oracle Solaris SPARC | =11.3 | |
OpenSSL libcrypto | <0.9.8zh | |
OpenSSL libcrypto | >=1.0.0<1.0.0t | |
OpenSSL libcrypto | >=1.0.1<1.0.1q | |
OpenSSL libcrypto | >=1.0.2<1.0.2e | |
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.2 | |
redhat enterprise Linux server aus | =7.3 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server aus | =7.7 | |
redhat enterprise Linux server tus | =7.2 | |
redhat enterprise Linux server tus | =7.3 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux server tus | =7.7 | |
redhat enterprise Linux workstation | =5.0 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.04 | |
Ubuntu Linux | =15.10 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
openSUSE | =42.1 | |
openSUSE | =11.4 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
SUSE Linux Enterprise Server | =10-sp4 | |
Fedoraproject Fedora | =22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2015-3195 has been classified as a high-severity vulnerability due to its potential to cause excessive memory usage and crashes.
To remediate CVE-2015-3195, upgrade OpenSSL to version 0.9.8zh, 1.0.0t or later, or apply the appropriate vendor-specific patches if using affected versions.
CVE-2015-3195 affects OpenSSL versions up to and including 1.0.2 and 1.0.0, as well as 0.9.8.
Yes, a remote attacker could exploit CVE-2015-3195 by sending specially crafted PKCS#7 or CMS data.
Applications that parse PKCS#7 or CMS data from untrusted sources are vulnerable to CVE-2015-3195.