5
CVSSv2

CVE-2015-0291

Published: 19/03/2015 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 446
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 prior to 1.0.2a allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl 1.0.2

Vendor Advisories

The sigalgs implementation in t1_libc in OpenSSL 102 before 102a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation ...
Multiple Cisco products incorporate a version of the OpenSSL package affected by one or more vulnerabilities that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or corrupt portions of OpenSSL process memory On March 19, 2015, the OpenSSL Project released a security advisory detailing 13 distinct vulner ...

Github Repositories

Recent Fuzzing Paper

Recent Papers Related To Fuzzing This website is only used for collecting and grouping the related paper If there are any paper need to be updated, you can contribute PR Please check the web wcventuregithubio/FuzzingPaper/, as the md file shown in Github is cropped Advertisement: Our ICTT (Guangzhou) research group is accepting applications for master’s, do

https://github.com/wcventure/FuzzingPaper

Recent Papers Related To Fuzzing Remark: This website is only used for collecting and grouping the related paper If there are any paper need to be updated, you can contribute PR Main Repo: githubcom/wcventure/FuzzingPaper Mirrors: gitcodenet/mirrors/wcventure/FuzzingPaper All Papers (Classification according to Publication) Survey/Review Fuzzing: Challen

patch-openssl-CVE-2015-0291_CVE-2015-0204 Patch openssl with ansible Usage : pip install ansible ansible-playbook -i your_inventory_file patch-openssl-CVE-2015-0291_CVE-2015-0204 your_inventory_file just need to contain your server list : 192168010 webserver1examplecom webserver2examplecom db1examplecom

Recent Articles

Awoogah: Get ready to patch 'severe' bug in OpenSSL this Thursday
The Register • Chris Williams, Editor in Chief • 06 Jul 2015

Heads up for July 9 security vulnerability fix

Sysadmins and anyone else with systems running OpenSSL code: a new version of the open-source crypto library will be released this week to "fix a single security defect classified as 'high' severity." The bug, we're told, will be addressed in versions 1.0.2d and 1.0.1p of the software. The vulnerability does not affect the 1.0.0 or 0.9.8 series. OpenSSL is a widely used library that provides encrypted HTTPS connections for countless websites, as well as other secure services. "The OpenSSL projec...

OpenSSL 'high' severity flaw just a puny DoS risk
The Register • John Leyden • 19 Mar 2015

Is that all you’ve got, ClientHello? I put on my brown trousers for this?

OpenSSL patched a “high” severity flaw as part of a patch batch on Thursday that turned out to be nowhere near as scary as widely feared. Fortunately, fears the software update might address another Heartbleed have been confounded. The worst of the flaws – dubbed ClientHello (CVE-2015-0291) – is simply a DoS risk, as an advisory from the developers explains. The other “high” (the highest severity classification of flaw in the OpenSSL world) vulnerability in the batch turned up to ref...