Search for vulnerabilities
Vulnerability details: VCID-ycfx-3rgq-aaah
Vulnerability ID VCID-ycfx-3rgq-aaah
Aliases CVE-2015-0290
VC-OPENSSL-20150319-CVE-2015-0290
Summary Multiblock corrupted pointer. OpenSSL 1.0.2 introduced the "multiblock" performance improvement. This feature only applies on 64 bit x86 architecture platforms that support AES NI instructions. A defect in the implementation of "multiblock" can cause OpenSSL's internal write buffer to become incorrectly set to NULL when using non-blocking IO. Typically, when the user application is using a socket BIO for writing, this will only result in a failed connection. However if some other BIO is used then it is likely that a segmentation fault will be triggered, thus enabling a potential DoS attack.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
generic_textual LOW http://marc.info/?l=bugtraq&m=144050155601375&w=2
epss 0.05789 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.05789 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.05789 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.05789 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.11103 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.11103 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.11103 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.11103 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.11103 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.11103 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.11103 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.11103 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.11103 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.11103 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.18157 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
epss 0.19659 https://api.first.org/data/v1/epss?cve=CVE-2015-0290
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2015-0290
generic_textual Low https://www.openssl.org/news/secadv/20150319.txt
cvssv3.1 7.5 http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
generic_textual HIGH http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
cvssv3.1 6.1 http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
generic_textual MODERATE http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
cvssv3.1 7.5 http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
Reference id Reference type URL
http://marc.info/?l=bugtraq&m=143748090628601&w=2
http://marc.info/?l=bugtraq&m=144050155601375&w=2
http://marc.info/?l=bugtraq&m=144050297101809&w=2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0290.json
https://api.first.org/data/v1/epss?cve=CVE-2015-0290
https://bto.bluecoat.com/security-advisory/sa92
https://bugzilla.redhat.com/show_bug.cgi?id=1202345
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=77c77f0a1b9f15b869ca3342186dfbedd1119d0e
https://git.openssl.org/?p=openssl.git;a=commit;h=77c77f0a1b9f15b869ca3342186dfbedd1119d0e
https://kc.mcafee.com/corporate/index?page=content&id=SB10110
https://security.gentoo.org/glsa/201503-11
https://www.openssl.org/news/secadv/20150319.txt
https://www.openssl.org/news/secadv_20150319.txt
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
http://www.securityfocus.com/bid/73226
http://www.securitytracker.com/id/1031929
cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*
CVE-2015-0290 https://nvd.nist.gov/vuln/detail/CVE-2015-0290
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2015-0290
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.93278
EPSS Score 0.05789
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.