CVE-2015-0292
Published Mar 19, 2015
Last updated a year ago
Overview
- Description
- Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 data that triggers a buffer overflow.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A28EB262-0B86-4956-B15A-66E93EBA408F", "versionEndIncluding": "0.9.8z" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FBD8C92-6138-4274-ACBA-D7D42DAEC5AC" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10FF0A06-DA61-4250-B083-67E55E362677" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A6BA453-C150-4159-B80B-5465EFF83F11" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "638A2E69-8AB6-4FEA-852A-FEF16A500C1A" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56C47D3A-B99D-401D-B6B8-1194B2DB4809" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08355B10-E004-4BE6-A5AE-4D428810580B" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "738BCFDC-1C49-4774-95AE-E099F707DEF9" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4B242C0-D27D-4644-AD19-5ACB853C9DC2" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8DC683F2-4346-4E5E-A8D7-67B4F4D7827B" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "764B7D38-BC1B-47DB-B1DF-D092BDA4BFCB" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6604E7BE-9F9B-444D-A63A-F65D1CFDF3BF" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "132B9217-B0E0-4E3E-9096-162AA28E158E" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7619F9A0-9054-4217-93D1-3EA64876C5B0" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D1C00C0-C77E-4255-9ECA-20F2673C7366" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A66E6CF-39CF-412E-8EF0-8E10BA21B4A4" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C684FB18-FDDC-4BED-A28C-C23EE6CD0094" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A74A79A7-4FAF-4C81-8622-050008B96AE1" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CEDACCB9-8D61-49EE-9957-9E58BC7BB031" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4993DD56-F9E3-4AC8-AC3E-BF204B950DEC" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E884B241-F9C3-44F8-A420-DE65F5F3D660" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A383620-B4F7-44A7-85DA-A4FF2E115D80" } ], "operator": "OR" } ] } ]