First published: Wed Sep 09 2015(Updated: )
http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting during an SSL handshake, which allows remote attackers to cause a denial of service (HTTPS call hang) via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.04 | |
Fedora | =21 | |
Fedora | =22 | |
Fedora | =23 | |
Apache Commons HttpClient | >=4.3<=4.3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5262 has been classified as a medium severity vulnerability due to the potential for denial of service during SSL handshakes.
To mitigate CVE-2015-5262, upgrade Apache HttpClient to version 4.3.6 or later.
CVE-2015-5262 affects Apache HttpClient versions before 4.3.6.
CVE-2015-5262 impacts multiple versions of Ubuntu Linux and Fedora, specifically those using affected versions of Apache HttpClient.
CVE-2015-5262 allows remote attackers to cause a denial of service by exploiting SSL handshake timeout issues.