CVE-2015-0209
Published Mar 19, 2015
Last updated a year ago
Overview
- Description
- Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Evaluator
- Comment
- <a href="http://cwe.mitre.org/data/definitions/416.html">CWE-416: Use After Free</a>
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE2907ED-57AA-41E4-9AC6-055F138B9204", "versionEndIncluding": "0.9.8ze" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FBD8C92-6138-4274-ACBA-D7D42DAEC5AC" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10FF0A06-DA61-4250-B083-67E55E362677" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A6BA453-C150-4159-B80B-5465EFF83F11" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "638A2E69-8AB6-4FEA-852A-FEF16A500C1A" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56C47D3A-B99D-401D-B6B8-1194B2DB4809" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08355B10-E004-4BE6-A5AE-4D428810580B" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "738BCFDC-1C49-4774-95AE-E099F707DEF9" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4B242C0-D27D-4644-AD19-5ACB853C9DC2" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8DC683F2-4346-4E5E-A8D7-67B4F4D7827B" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "764B7D38-BC1B-47DB-B1DF-D092BDA4BFCB" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6604E7BE-9F9B-444D-A63A-F65D1CFDF3BF" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "132B9217-B0E0-4E3E-9096-162AA28E158E" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7619F9A0-9054-4217-93D1-3EA64876C5B0" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D82C405-17E2-4DF1-8DF5-315BD5A41595" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C96806F-4718-4BD3-9102-55A26AA86498" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0o:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A16CD99-AF7F-4931-AD2E-77727BA18FBD" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0p:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88440697-754A-47A7-BF83-4D0EB68FFB10" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0q:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD51F0FC-F426-4AE5-B3B9-B813C580EBAE" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D1C00C0-C77E-4255-9ECA-20F2673C7366" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A66E6CF-39CF-412E-8EF0-8E10BA21B4A4" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C684FB18-FDDC-4BED-A28C-C23EE6CD0094" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A74A79A7-4FAF-4C81-8622-050008B96AE1" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CEDACCB9-8D61-49EE-9957-9E58BC7BB031" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4993DD56-F9E3-4AC8-AC3E-BF204B950DEC" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E884B241-F9C3-44F8-A420-DE65F5F3D660" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A383620-B4F7-44A7-85DA-A4FF2E115D80" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F0C6812-F455-49CF-B29B-9AC00306DA43" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F2D462C-A1B4-4572-A615-BDE9DC5F1E55" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3703E445-17C0-4C85-A496-A35641C0C8DB" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F4034B9-EF1C-40E6-B92A-D4D7B7E7E774" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ABEC1927-F469-4B9E-B544-DA6CF90F0B34" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD3E5C1B-EC63-4214-A0BD-0B8681CE6C8B" } ], "operator": "OR" } ] } ]