Search for vulnerabilities
Vulnerability details: VCID-914k-6fj2-aaac
Vulnerability ID VCID-914k-6fj2-aaac
Aliases CVE-2015-0286
VC-OPENSSL-20150319-CVE-2015-0286
Summary Segmentation fault in ASN1_TYPE_cmp. The function ASN1_TYPE_cmp will crash with an invalid read if an attempt is made to compare ASN.1 boolean types. Since ASN1_TYPE_cmp is used to check certificate signature algorithm consistency this can be used to crash any certificate verification operation and exploited in a DoS attack. Any application which performs certificate verification is vulnerable including OpenSSL clients and servers which enable client authentication.
Status Published
Exploitability 2.0
Weighted Severity 8.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
generic_textual Medium http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html
generic_textual LOW http://marc.info/?l=bugtraq&m=144050155601375&w=2
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-0286.html
rhas Moderate https://access.redhat.com/errata/RHSA-2015:0715
rhas Moderate https://access.redhat.com/errata/RHSA-2015:0716
rhas Moderate https://access.redhat.com/errata/RHSA-2015:0752
rhas Important https://access.redhat.com/errata/RHSA-2016:2957
epss 0.1067 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.1067 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.13619 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.13619 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.13619 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.236 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.25244 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.25244 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.25244 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.25244 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.25244 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.25244 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.25244 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.25244 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.25244 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.25244 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.25244 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.25244 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.25244 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.25244 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.25244 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.25244 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.25244 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.25244 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.25244 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.25244 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.25244 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.25244 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.25244 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.28215 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.30571 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.31625 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.31625 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.34605 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.91608 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.91608 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.91608 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.91608 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.93161 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.93161 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.94079 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.94079 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.94079 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.94079 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.94079 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.94079 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.94079 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.94079 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
epss 0.94079 https://api.first.org/data/v1/epss?cve=CVE-2015-0286
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0292
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2015-0286
generic_textual Medium https://support.apple.com/HT205212
generic_textual Medium https://ubuntu.com/security/notices/USN-2537-1
generic_textual Low https://www.openssl.org/news/secadv/20150319.txt
cvssv3.1 9.8 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
generic_textual CRITICAL http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
cvssv3.1 8.1 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
generic_textual HIGH http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
cvssv3.1 7.5 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
generic_textual HIGH http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
cvssv3.1 6.1 http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
generic_textual MODERATE http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
generic_textual MODERATE http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
cvssv3.1 7.5 http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
Reference id Reference type URL
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html
http://marc.info/?l=bugtraq&m=142841429220765&w=2
http://marc.info/?l=bugtraq&m=143213830203296&w=2
http://marc.info/?l=bugtraq&m=143748090628601&w=2
http://marc.info/?l=bugtraq&m=144050155601375&w=2
http://marc.info/?l=bugtraq&m=144050254401665&w=2
http://marc.info/?l=bugtraq&m=144050297101809&w=2
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-0286.html
http://rhn.redhat.com/errata/RHSA-2015-0715.html
http://rhn.redhat.com/errata/RHSA-2015-0716.html
http://rhn.redhat.com/errata/RHSA-2015-0752.html
http://rhn.redhat.com/errata/RHSA-2016-2957.html
https://access.redhat.com/articles/1384453
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0286.json
https://api.first.org/data/v1/epss?cve=CVE-2015-0286
https://bto.bluecoat.com/security-advisory/sa92
https://bugzilla.redhat.com/show_bug.cgi?id=1202366
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0292
https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c3c7fb07dc975dc3c9de0eddb7d8fd79fc9c67c1
https://git.openssl.org/?p=openssl.git;a=commit;h=c3c7fb07dc975dc3c9de0eddb7d8fd79fc9c67c1
https://kc.mcafee.com/corporate/index?page=content&id=SB10110
https://support.apple.com/HT205212
https://support.apple.com/HT205267
https://support.citrix.com/article/CTX216642
https://ubuntu.com/security/notices/USN-2537-1
http://support.apple.com/kb/HT204942
https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc
https://www.openssl.org/news/secadv/20150319.txt
https://www.openssl.org/news/secadv_20150319.txt
http://www.debian.org/security/2015/dsa-3197
http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
http://www.mandriva.com/security/advisories?name=MDVSA-2015:063
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
http://www.securityfocus.com/bid/73225
http://www.securitytracker.com/id/1031929
http://www.securitytracker.com/id/1032917
http://www.ubuntu.com/usn/USN-2537-1
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0o:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0o:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0p:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0p:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0q:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0q:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
CVE-2015-0286 https://nvd.nist.gov/vuln/detail/CVE-2015-0286
RHSA-2015:0715 https://access.redhat.com/errata/RHSA-2015:0715
RHSA-2015:0716 https://access.redhat.com/errata/RHSA-2015:0716
RHSA-2015:0752 https://access.redhat.com/errata/RHSA-2015:0752
RHSA-2016:2957 https://access.redhat.com/errata/RHSA-2016:2957
USN-2537-1 https://usn.ubuntu.com/2537-1/
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2015-0286
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.92913
EPSS Score 0.1067
Published At May 3, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.