CVE-2015-0291Improper Restriction of Operations within the Bounds of a Memory Buffer in Openssl

Severity
5.0MEDIUMNVD
EPSS
33.2%
top 3.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 19
Latest updateDec 19

Description

The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

Patches

🔴Vulnerability Details

1
GHSA
GHSA-3hjm-7xr7-8fgf: The sigalgs implementation in t1_lib2022-05-14

📋Vendor Advisories

18
CISA ICS
Siemens SCALANCE X-200RNA Switch Devices2022-12-19
CISA ICS
Rockwell Automation Stratix 59002017-05-10
Cisco
Multiple Vulnerabilities in OpenSSL (March 2015) Affecting Cisco Products2015-03-20
Red Hat
openssl: ClientHello sigalgs NULL pointer dereference DoS2015-03-19
Debian
CVE-2015-0291: openssl - The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows rem...2015

📄Research Papers

1
arXiv
Server-side verification of client behavior in cryptographic protocols2016-03-13

💬Community

1
Bugzilla
CVE-2015-0291 openssl: ClientHello sigalgs NULL pointer dereference DoS2015-03-16
CVE-2015-0291 — Openssl vulnerability | cvebase