ID

VAR-201512-0484


CVE

CVE-2015-3195


TITLE

OpenSSL X509_ATTRIBUTE Structure Information Disclosure Vulnerability

Trust: 0.6

sources: CNVD: CNVD-2015-07950

DESCRIPTION

The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application. OpenSSL is an open source SSL implementation used to implement high-strength encryption of network communications. OpenSSL's handling of X509_ATTRIBUTE has a security vulnerability. A remote attacker can use the vulnerability to send a message containing a special X509_ATTRIBUTE structure to trigger a memory leak. The attacker can obtain sensitive information. It supports a variety of encryption algorithms, including symmetric ciphers, hash algorithms, security hashing algorithm, etc. The vulnerability is due to the error caused by the program not correctly handling the malformed X509_ATTRIBUTE data. The following versions are affected: OpenSSL prior to 0.9.8zh, 1.0.0 prior to 1.0.0t, 1.0.1 prior to 1.0.1q, 1.0.2 prior to 1.0.2e. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat JBoss Enterprise Application Platform 6.4.10 natives update on RHEL 7 Advisory ID: RHSA-2016:2054-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2054.html Issue date: 2016-10-12 CVE Names: CVE-2015-3183 CVE-2015-3195 CVE-2015-4000 CVE-2016-2105 CVE-2016-2106 CVE-2016-2108 CVE-2016-2109 CVE-2016-3110 CVE-2016-4459 ===================================================================== 1. Summary: Updated packages that provide Red Hat JBoss Enterprise Application Platform 6.4.10 natives, fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server - noarch, ppc64, x86_64 3. Description: Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. This release includes bug fixes and enhancements, as well as a new release of OpenSSL that addresses a number of outstanding security flaws. For further information, see the knowledge base article linked to in the References section. All users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat Enterprise Linux 7 are advised to upgrade to these updated packages. The JBoss server process must be restarted for the update to take effect. Security Fix(es): * A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library. (CVE-2016-2108) * Multiple flaws were found in the way httpd parsed HTTP requests and responses using chunked transfer encoding. A remote attacker could use these flaws to create a specially crafted request, which httpd would decode differently from an HTTP proxy software in front of it, possibly leading to HTTP request smuggling attacks. (CVE-2015-3183) * A memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and CMS data. (CVE-2015-3195) * A flaw was found in the way the TLS protocol composes the Diffie-Hellman exchange (for both export and non-export grade cipher suites). An attacker could use this flaw to downgrade a DHE connection to use export-grade key sizes, which could then be broken by sufficient pre-computation. This can lead to a passive man-in-the-middle attack in which the attacker is able to decrypt all traffic. (CVE-2015-4000) * An integer overflow flaw, leading to a buffer overflow, was found in the way the EVP_EncodeUpdate() function of OpenSSL parsed very large amounts of input data. A remote attacker could use this flaw to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application. (CVE-2016-2105) * An integer overflow flaw, leading to a buffer overflow, was found in the way the EVP_EncryptUpdate() function of OpenSSL parsed very large amounts of input data. A remote attacker could use this flaw to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application. (CVE-2016-2106) * It was discovered that it is possible to remotely Segfault Apache http server with a specially crafted string sent to the mod_cluster via service messages (MCMP). (CVE-2016-3110) * A denial of service flaw was found in the way OpenSSL parsed certain ASN.1-encoded data from BIO (OpenSSL's I/O abstraction) inputs. An application using OpenSSL that accepts untrusted ASN.1 BIO input could be forced to allocate an excessive amount of data. (CVE-2016-2109) * It was discovered that specifying configuration with a JVMRoute path longer than 80 characters will cause segmentation fault leading to a server crash. (CVE-2016-4459) Red Hat would like to thank the OpenSSL project for reporting CVE-2016-2108, CVE-2016-2105, and CVE-2016-2106 and Michal Karm Babacek for reporting CVE-2016-3110. The CVE-2016-4459 issue was discovered by Robert Bost (Red Hat). Upstream acknowledges Huzaifa Sidhpurwala (Red Hat), Hanno BAPck, and David Benjamin (Google) as the original reporters of CVE-2016-2108; and Guido Vranken as the original reporter of CVE-2016-2105 and CVE-2016-2106. 4. Solution: Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications. For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. 5. Bugs fixed (https://bugzilla.redhat.com/): 1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks 1243887 - CVE-2015-3183 httpd: HTTP request smuggling attack against chunked request parser 1288322 - CVE-2015-3195 OpenSSL: X509_ATTRIBUTE memory leak 1326320 - CVE-2016-3110 mod_cluster: remotely Segfault Apache http server 1330101 - CVE-2016-2109 openssl: ASN.1 BIO handling of large amounts of data 1331402 - CVE-2016-2108 openssl: Memory corruption in the ASN.1 encoder 1331441 - CVE-2016-2105 openssl: EVP_EncodeUpdate overflow 1331536 - CVE-2016-2106 openssl: EVP_EncryptUpdate overflow 1341583 - CVE-2016-4459 mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute 1345989 - RHEL7 RPMs: Upgrade mod_cluster-native to 1.2.13.Final-redhat-1 1345993 - RHEL7 RPMs: Upgrade mod_jk to 1.2.41.redhat-1 1345997 - RHEL7 RPMs: Upgrade tomcat-native to 1.1.34 6. Package List: Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server: Source: hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el7.src.rpm httpd22-2.2.26-56.ep6.el7.src.rpm jbcs-httpd24-openssl-1.0.2h-4.jbcs.el7.src.rpm mod_jk-1.2.41-2.redhat_4.ep6.el7.src.rpm tomcat-native-1.1.34-5.redhat_1.ep6.el7.src.rpm noarch: jbcs-httpd24-1-3.jbcs.el7.noarch.rpm jbcs-httpd24-runtime-1-3.jbcs.el7.noarch.rpm ppc64: hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el7.ppc64.rpm hornetq-native-debuginfo-2.3.25-4.SP11_redhat_1.ep6.el7.ppc64.rpm httpd22-2.2.26-56.ep6.el7.ppc64.rpm httpd22-debuginfo-2.2.26-56.ep6.el7.ppc64.rpm httpd22-devel-2.2.26-56.ep6.el7.ppc64.rpm httpd22-manual-2.2.26-56.ep6.el7.ppc64.rpm httpd22-tools-2.2.26-56.ep6.el7.ppc64.rpm jbcs-httpd24-openssl-1.0.2h-4.jbcs.el7.ppc64.rpm jbcs-httpd24-openssl-debuginfo-1.0.2h-4.jbcs.el7.ppc64.rpm jbcs-httpd24-openssl-devel-1.0.2h-4.jbcs.el7.ppc64.rpm jbcs-httpd24-openssl-libs-1.0.2h-4.jbcs.el7.ppc64.rpm jbcs-httpd24-openssl-perl-1.0.2h-4.jbcs.el7.ppc64.rpm jbcs-httpd24-openssl-static-1.0.2h-4.jbcs.el7.ppc64.rpm jbossas-hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el7.ppc64.rpm jbossas-jbossweb-native-1.1.34-5.redhat_1.ep6.el7.ppc64.rpm mod_jk-ap22-1.2.41-2.redhat_4.ep6.el7.ppc64.rpm mod_jk-debuginfo-1.2.41-2.redhat_4.ep6.el7.ppc64.rpm mod_ldap22-2.2.26-56.ep6.el7.ppc64.rpm mod_ssl22-2.2.26-56.ep6.el7.ppc64.rpm tomcat-native-1.1.34-5.redhat_1.ep6.el7.ppc64.rpm tomcat-native-debuginfo-1.1.34-5.redhat_1.ep6.el7.ppc64.rpm x86_64: hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el7.x86_64.rpm hornetq-native-debuginfo-2.3.25-4.SP11_redhat_1.ep6.el7.x86_64.rpm httpd22-2.2.26-56.ep6.el7.x86_64.rpm httpd22-debuginfo-2.2.26-56.ep6.el7.x86_64.rpm httpd22-devel-2.2.26-56.ep6.el7.x86_64.rpm httpd22-manual-2.2.26-56.ep6.el7.x86_64.rpm httpd22-tools-2.2.26-56.ep6.el7.x86_64.rpm jbcs-httpd24-openssl-1.0.2h-4.jbcs.el7.x86_64.rpm jbcs-httpd24-openssl-debuginfo-1.0.2h-4.jbcs.el7.x86_64.rpm jbcs-httpd24-openssl-devel-1.0.2h-4.jbcs.el7.x86_64.rpm jbcs-httpd24-openssl-libs-1.0.2h-4.jbcs.el7.x86_64.rpm jbcs-httpd24-openssl-perl-1.0.2h-4.jbcs.el7.x86_64.rpm jbcs-httpd24-openssl-static-1.0.2h-4.jbcs.el7.x86_64.rpm jbossas-hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el7.x86_64.rpm jbossas-jbossweb-native-1.1.34-5.redhat_1.ep6.el7.x86_64.rpm mod_jk-ap22-1.2.41-2.redhat_4.ep6.el7.x86_64.rpm mod_jk-debuginfo-1.2.41-2.redhat_4.ep6.el7.x86_64.rpm mod_ldap22-2.2.26-56.ep6.el7.x86_64.rpm mod_ssl22-2.2.26-56.ep6.el7.x86_64.rpm tomcat-native-1.1.34-5.redhat_1.ep6.el7.x86_64.rpm tomcat-native-debuginfo-1.1.34-5.redhat_1.ep6.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3183 https://access.redhat.com/security/cve/CVE-2015-3195 https://access.redhat.com/security/cve/CVE-2015-4000 https://access.redhat.com/security/cve/CVE-2016-2105 https://access.redhat.com/security/cve/CVE-2016-2106 https://access.redhat.com/security/cve/CVE-2016-2108 https://access.redhat.com/security/cve/CVE-2016-2109 https://access.redhat.com/security/cve/CVE-2016-3110 https://access.redhat.com/security/cve/CVE-2016-4459 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/articles/2688611 https://access.redhat.com/solutions/222023 https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.4/index.html https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.4 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX/nCuXlSAg2UNWIIRAq6gAKCk3O4+LVrC6nN6yUHOOzpm8GB7NQCcDcA0 n7n6E5uqbAY0W1AG5Z+9yy8= =6ET2 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-SA-15:26.openssl Security Advisory The FreeBSD Project Topic: Multiple OpenSSL vulnerabilities Category: contrib Module: openssl Announced: 2015-12-05 Affects: All supported versions of FreeBSD. Corrected: 2015-12-03 21:18:48 UTC (stable/10, 10.2-STABLE) 2015-12-05 09:53:58 UTC (releng/10.2, 10.2-RELEASE-p8) 2015-12-05 09:53:58 UTC (releng/10.1, 10.1-RELEASE-p25) 2015-12-03 21:24:40 UTC (stable/9, 9.3-STABLE) 2015-12-05 09:53:58 UTC (releng/9.3, 9.3-RELEASE-p31) CVE Name: CVE-2015-3194, CVE-2015-3195, CVE-2015-3196 For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit <URL:https://security.FreeBSD.org/>. Background FreeBSD includes software from the OpenSSL Project. The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. II. Problem Description The signature verification routines will crash with a NULL pointer dereference if presented with an ASN.1 signature using the RSA PSS algorithm and absent mask generation function parameter. [CVE-2015-3195] If PSK identity hints are received by a multi-threaded client then the values are incorrectly updated in the parent SSL_CTX structure. [CVE-2015-3196] III. [CVE-2015-3194] This affects FreeBSD 10.x only. [CVE-2015-3196]. This affects FreeBSD 10.1 only. IV. Workaround No workaround is available. V. Solution Perform one of the following: 1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date. Reboot is optional but recommended. 2) To update your vulnerable system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install Reboot is optional but recommended. 3) To update your vulnerable system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. [FreeBSD 9.3] # fetch https://security.FreeBSD.org/patches/SA-15:26/openssl-9.3.patch # fetch https://security.FreeBSD.org/patches/SA-15:26/openssl-9.3.patch.asc # gpg --verify openssl-9.3.patch.asc [FreeBSD 10.1] # fetch https://security.FreeBSD.org/patches/SA-15:26/openssl-10.1.patch # fetch https://security.FreeBSD.org/patches/SA-15:26/openssl-10.1.patch.asc # gpg --verify openssl-10.1.patch.asc [FreeBSD 10.2] # fetch https://security.FreeBSD.org/patches/SA-15:26/openssl-10.2.patch # fetch https://security.FreeBSD.org/patches/SA-15:26/openssl-10.2.patch.asc # gpg --verify openssl-10.2.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile the operating system using buildworld and installworld as described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>. Restart all deamons using the library, or reboot the system. VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/9/ r291722 releng/9.3/ r291854 stable/10/ r291721 releng/10.1/ r291854 releng/10.2/ r291854 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: <URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> VII. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n a-c05131085 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05131085 Version: 1 HPSBMU03590 rev.1 - HPE Systems Insight Manager (SIM) on Windows and Linux, Multiple Vulnerabilities NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2016-05-12 Last Updated: 2016-05-12 Potential Security Impact: Cross-Site Request Forgery (CSRF), Cross-Site Scripting (XSS), Remote Arbitrary Code Execution, Denial of Service (DoS), Disclosure of Information Source: Hewlett Packard Enterprise, Product Security Response Team VULNERABILITY SUMMARY Several potential security vulnerabilities have been identified in HPE Systems Insight Manager (SIM) on Windows and Linux. The vulnerabilities could be exploited remotely resulting in Denial of Service (DoS), execution of arbitrary code, disclosure of information, Cross-site Request Forgery (CSRF), and Cross-site scripting (XSS). References: CVE-2015-3194 CVE-2015-3195 CVE-2016-0705 CVE-2016-0799 CVE-2016-2842 PSRT110092 CVE-2015-6565 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Systems Insight Manager (HP SIM), prior to 7.5.1 BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2015-3194 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-3195 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2016-0705 (AV:N/AC:H/Au:N/C:C/I:C/A:C) 7.6 CVE-2016-0799 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2016-2842 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2015-6565 (AV:L/AC:L/Au:N/C:C/I:C/A:C) 7.2 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HPE has provided the following software updates to resolve the vulnerabilities for the impacted versions of HPE Systems Insight Manager (SIM). Please download the latest version of HPE Systems Insight Manager (7.5.1) from the following location: https://www.hp.com/go/hpsim HISTORY Version:1 (rev.1) - 12 May 2016 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability with any HPE supported product, send Email to: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. The References section of this erratum contains a download link (you must log in to download the update). 5 client) - i386, x86_64 3. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. CVE-2015-3196 A race condition flaw in the handling of PSK identify hints was discovered, potentially leading to a double free of the identify hint data. For the oldstable distribution (wheezy), these problems have been fixed in version 1.0.1e-2+deb7u18. For the stable distribution (jessie), these problems have been fixed in version 1.0.1k-3+deb8u2. For the unstable distribution (sid), these problems have been fixed in version 1.0.2e-1 or earlier

Trust: 2.34

sources: NVD: CVE-2015-3195 // CNVD: CNVD-2015-07950 // VULHUB: VHN-81156 // VULMON: CVE-2015-3195 // PACKETSTORM: 139115 // PACKETSTORM: 137292 // PACKETSTORM: 139114 // PACKETSTORM: 134650 // PACKETSTORM: 136992 // PACKETSTORM: 139116 // PACKETSTORM: 134783 // PACKETSTORM: 134632

AFFECTED PRODUCTS

vendor:opensslmodel:1.0.1scope: - version: -

Trust: 1.2

vendor:opensusemodel:leapscope:eqversion:42.1

Trust: 1.0

vendor:oraclemodel:solarisscope:eqversion:11.3

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:15.10

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:11.4

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.6

Trust: 1.0

vendor:oraclemodel:transportation managementscope:eqversion:6.1

Trust: 1.0

vendor:oraclemodel:communications webrtc session controllerscope:eqversion:7.1

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.0.2

Trust: 1.0

vendor:oraclemodel:transportation managementscope:eqversion:6.2

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.2

Trust: 1.0

vendor:oraclemodel:api gatewayscope:eqversion:11.1.2.4.0

Trust: 1.0

vendor:oraclemodel:vm virtualboxscope:gteversion:5.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.4

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.6

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:15.04

Trust: 1.0

vendor:oraclemodel:communications webrtc session controllerscope:eqversion:7.2

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:6.0

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.1

Trust: 1.0

vendor:oraclemodel:exalogic infrastructurescope:eqversion:1.0

Trust: 1.0

vendor:oraclemodel:communications webrtc session controllerscope:eqversion:7.0

Trust: 1.0

vendor:opensslmodel:opensslscope:ltversion:1.0.0t

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:oraclemodel:life sciences data hubscope:eqversion:2.1

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:10

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.0

vendor:oraclemodel:api gatewayscope:eqversion:11.1.2.3.0

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:5.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.3

Trust: 1.0

vendor:oraclemodel:vm virtualboxscope:ltversion:5.0.14

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6.0

Trust: 1.0

vendor:oraclemodel:sun ray softwarescope:eqversion:11.1

Trust: 1.0

vendor:oraclemodel:vm virtualboxscope:ltversion:4.3.36

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.3

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:22

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.11.4

Trust: 1.0

vendor:oraclemodel:linuxscope:eqversion:5

Trust: 1.0

vendor:oraclemodel:linuxscope:eqversion:6

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.0.1

Trust: 1.0

vendor:opensslmodel:opensslscope:ltversion:1.0.2e

Trust: 1.0

vendor:opensslmodel:opensslscope:ltversion:1.0.1q

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:5.0

Trust: 1.0

vendor:oraclemodel:linuxscope:eqversion:7

Trust: 1.0

vendor:oraclemodel:integrated lights out managerscope:gteversion:3.0

Trust: 1.0

vendor:opensslmodel:opensslscope:ltversion:0.9.8zh

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.7

Trust: 1.0

vendor:oraclemodel:integrated lights out managerscope:lteversion:4.0.4

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.2

Trust: 1.0

vendor:oraclemodel:exalogic infrastructurescope:eqversion:2.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.7

Trust: 1.0

vendor:oraclemodel:http serverscope:eqversion:11.5.10.2

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6.0

Trust: 1.0

vendor:oraclemodel:vm serverscope:eqversion:3.2

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.2

Trust: 1.0

vendor:oraclemodel:solarisscope:eqversion:10

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:5.0

Trust: 1.0

vendor:opensslmodel:<0.9.8zhscope: - version: -

Trust: 0.6

vendor:opensslmodel:1.0.2scope: - version: -

Trust: 0.6

vendor:opensslmodel:opensslscope:eqversion:1.0.0k

Trust: 0.6

vendor:opensslmodel:opensslscope:eqversion:1.0.0s

Trust: 0.6

vendor:opensslmodel:opensslscope:eqversion:1.0.0j

Trust: 0.6

vendor:opensslmodel:opensslscope:eqversion:1.0.0r

Trust: 0.6

vendor:opensslmodel:opensslscope:eqversion:1.0.0q

Trust: 0.6

vendor:opensslmodel:opensslscope:eqversion:1.0.0m

Trust: 0.6

vendor:opensslmodel:opensslscope:eqversion:1.0.0l

Trust: 0.6

vendor:opensslmodel:opensslscope:eqversion:1.0.0n

Trust: 0.6

vendor:opensslmodel:opensslscope:eqversion:1.0.0o

Trust: 0.6

vendor:opensslmodel:opensslscope:eqversion:1.0.0i

Trust: 0.6

sources: CNVD: CNVD-2015-07950 // CNNVD: CNNVD-201512-075 // NVD: CVE-2015-3195

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-3195
value: MEDIUM

Trust: 1.0

CNVD: CNVD-2015-07950
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201512-075
value: MEDIUM

Trust: 0.6

VULHUB: VHN-81156
value: MEDIUM

Trust: 0.1

VULMON: CVE-2015-3195
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-3195
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

CNVD: CNVD-2015-07950
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-81156
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-3195
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2015-07950 // VULHUB: VHN-81156 // VULMON: CVE-2015-3195 // CNNVD: CNNVD-201512-075 // NVD: CVE-2015-3195

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.1

sources: VULHUB: VHN-81156 // NVD: CVE-2015-3195

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 137292 // PACKETSTORM: 134783 // CNNVD: CNNVD-201512-075

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201512-075

PATCH

title:Patch for OpenSSL X509_ATTRIBUTE Structure Information Disclosure Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/67698

Trust: 0.6

title:OpenSSL ASN1_TFLG_COMBINE Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=58937

Trust: 0.6

title:Red Hat: Moderate: openssl security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20152616 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: openssl security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20152617 - Security Advisory

Trust: 0.1

title:Red Hat: CVE-2015-3195url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2015-3195

Trust: 0.1

title:Debian Security Advisories: DSA-3413-1 openssl -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=82bedc073c0f22b408ebaf092ed8621c

Trust: 0.1

title:Ubuntu Security Notice: openssl vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2830-1

Trust: 0.1

title:Amazon Linux AMI: ALAS-2015-614url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2015-614

Trust: 0.1

title:Tenable Security Advisories: [R7] OpenSSL '20151203' Advisory Affects Tenable SecurityCenterurl:https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2016-01

Trust: 0.1

title:Cisco: Multiple Vulnerabilities in OpenSSL (December 2015) Affecting Cisco Productsurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20151204-openssl

Trust: 0.1

title:Forcepoint Security Advisories: CVE-2015-3194, 3195, 3196 -- Security Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=forcepoint_security_advisories&qid=62ab21cc073446940abce12c35db3049

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Core Services Apache HTTP 2.4.23 Releaseurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162957 - Security Advisory

Trust: 0.1

title:Symantec Security Advisories: SA105 : OpenSSL Vulnerabilities 3-Dec-2015url:https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=a924415f718a299b2d1e8046890941f3

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - October 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=435ed9abc2fb1e74ce2a69605a01e326

Trust: 0.1

title:Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - January 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=eb439566c9130adc92d21bc093204cf8

Trust: 0.1

title:Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - July 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins&qid=6c15273f6bf4a785175f27073b98a1ce

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - October 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=05aabe19d38058b7814ef5514aab4c0c

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - April 2017url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=143b3fb255063c81571469eaa3cf0a87

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - October 2017url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=523d3f220a64ff01dd95e064bd37566a

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=e2a7f287e9acc8c64ab3df71130bc64d

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - July 2017url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=2f446a7e1ea263c0c3a365776c6713f2

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - April 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=122319027ae43d6d626710f1b1bb1d43

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - July 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=3a04485ebb79f7fbc2472bf9af5ce489

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=63802a6c83b107c4e6e0c7f9241a66a8

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2015-3195

Trust: 0.1

sources: CNVD: CNVD-2015-07950 // VULMON: CVE-2015-3195 // CNNVD: CNNVD-201512-075

EXTERNAL IDS

db:NVDid:CVE-2015-3195

Trust: 3.2

db:BIDid:91787

Trust: 1.8

db:BIDid:78626

Trust: 1.8

db:JUNIPERid:JSA10733

Trust: 1.8

db:JUNIPERid:JSA10761

Trust: 1.8

db:JUNIPERid:JSA10759

Trust: 1.8

db:SECTRACKid:1034294

Trust: 1.8

db:SIEMENSid:SSA-412672

Trust: 1.8

db:PULSESECUREid:SA40100

Trust: 1.8

db:CNNVDid:CNNVD-201512-075

Trust: 0.7

db:CNVDid:CNVD-2015-07950

Trust: 0.6

db:AUSCERTid:ESB-2022.0696

Trust: 0.6

db:PACKETSTORMid:134783

Trust: 0.2

db:VULHUBid:VHN-81156

Trust: 0.1

db:ICS CERTid:ICSA-22-349-21

Trust: 0.1

db:VULMONid:CVE-2015-3195

Trust: 0.1

db:PACKETSTORMid:139115

Trust: 0.1

db:PACKETSTORMid:137292

Trust: 0.1

db:PACKETSTORMid:139114

Trust: 0.1

db:PACKETSTORMid:134650

Trust: 0.1

db:PACKETSTORMid:136992

Trust: 0.1

db:PACKETSTORMid:139116

Trust: 0.1

db:PACKETSTORMid:134632

Trust: 0.1

sources: CNVD: CNVD-2015-07950 // VULHUB: VHN-81156 // VULMON: CVE-2015-3195 // PACKETSTORM: 139115 // PACKETSTORM: 137292 // PACKETSTORM: 139114 // PACKETSTORM: 134650 // PACKETSTORM: 136992 // PACKETSTORM: 139116 // PACKETSTORM: 134783 // PACKETSTORM: 134632 // CNNVD: CNNVD-201512-075 // NVD: CVE-2015-3195

REFERENCES

url:http://www.debian.org/security/2015/dsa-3413

Trust: 2.4

url:http://openssl.org/news/secadv/20151203.txt

Trust: 1.9

url:http://rhn.redhat.com/errata/rhsa-2015-2616.html

Trust: 1.9

url:http://rhn.redhat.com/errata/rhsa-2016-2056.html

Trust: 1.9

url:http://lists.apple.com/archives/security-announce/2016/mar/msg00004.html

Trust: 1.8

url:http://www.securityfocus.com/bid/78626

Trust: 1.8

url:http://www.securityfocus.com/bid/91787

Trust: 1.8

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151204-openssl

Trust: 1.8

url:http://fortiguard.com/advisory/openssl-advisory-december-2015

Trust: 1.8

url:http://www.fortiguard.com/advisory/openssl-advisory-december-2015

Trust: 1.8

url:http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html

Trust: 1.8

url:http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html

Trust: 1.8

url:http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

Trust: 1.8

url:http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html

Trust: 1.8

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

Trust: 1.8

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html

Trust: 1.8

url:http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html

Trust: 1.8

url:http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html

Trust: 1.8

url:http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html

Trust: 1.8

url:http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

Trust: 1.8

url:https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf

Trust: 1.8

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04944173

Trust: 1.8

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05111017

Trust: 1.8

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05131085

Trust: 1.8

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05150888

Trust: 1.8

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05158380

Trust: 1.8

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05398322

Trust: 1.8

url:https://kb.pulsesecure.net/articles/pulse_security_advisories/sa40100

Trust: 1.8

url:https://support.apple.com/ht206167

Trust: 1.8

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-december/173801.html

Trust: 1.8

url:http://rhn.redhat.com/errata/rhsa-2015-2617.html

Trust: 1.8

url:http://rhn.redhat.com/errata/rhsa-2016-2957.html

Trust: 1.8

url:http://www.securitytracker.com/id/1034294

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-updates/2015-12/msg00087.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-updates/2015-12/msg00103.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html

Trust: 1.8

url:http://www.ubuntu.com/usn/usn-2830-1

Trust: 1.8

url:http://marc.info/?l=bugtraq&m=145382583417444&w=2

Trust: 1.7

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10761

Trust: 1.7

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10759

Trust: 1.7

url:http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.754583

Trust: 1.7

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10733

Trust: 1.7

url:https://git.openssl.org/?p=openssl.git%3ba=commit%3bh=cc598f321fbac9c04da5766243ed55d55948637d

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3195

Trust: 0.8

url:https://git.openssl.org/?p=openssl.git;a=commit;h=cc598f321fbac9c04da5766243ed55d55948637d

Trust: 0.7

url:https://www.openssl.org/news/secadv/20151203.txt

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0696

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.4

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2015-3195

Trust: 0.4

url:https://bugzilla.redhat.com/):

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-3194

Trust: 0.4

url:https://access.redhat.com/articles/2688611

Trust: 0.3

url:https://access.redhat.com/solutions/222023

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-2109

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-2106

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2016-2109

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-4459

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2015-4000

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-4000

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-3183

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2016-2106

Trust: 0.3

url:https://access.redhat.com/articles/11258

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2016-2105

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2016-3110

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2016-4459

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-2108

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2015-3183

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-2105

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-3110

Trust: 0.3

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=appplatform&downloadtype=securitypatches&version=6.4

Trust: 0.3

url:https://access.redhat.com/security/team/key/

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2016-2108

Trust: 0.3

url:https://access.redhat.com/documentation/en-us/jboss_enterprise_application_platform/6.4/index.html

Trust: 0.2

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-0705

Trust: 0.2

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-0799

Trust: 0.2

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-6565

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3196

Trust: 0.2

url:http://kb.juniper.net/infocenter/index?page=content&amp;id=jsa10733

Trust: 0.1

url:http://kb.juniper.net/infocenter/index?page=content&amp;id=jsa10759

Trust: 0.1

url:http://kb.juniper.net/infocenter/index?page=content&amp;id=jsa10761

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=145382583417444&amp;w=2

Trust: 0.1

url:http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2015&amp;m=slackware-security.754583

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/200.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2015:2616

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2015-3195

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/2830-1/

Trust: 0.1

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-21

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=42530

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2016-2055.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7995

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-6750

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1790

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8035

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1788

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1792

Trust: 0.1

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131085

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3567

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3237

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3513

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1789

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1791

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2015

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-0728

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7501

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2017

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7547

Trust: 0.1

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_

Trust: 0.1

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05111017

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4969

Trust: 0.1

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131044

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0205

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3568

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3508

Trust: 0.1

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05130958

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3569

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3509

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3511

Trust: 0.1

url:http://www.hpe.com/info/insightcontrol

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2016-2054.html

Trust: 0.1

url:https://www.freebsd.org/handbook/makeworld.html>.

Trust: 0.1

url:https://security.freebsd.org/>.

Trust: 0.1

url:https://security.freebsd.org/patches/sa-15:26/openssl-10.2.patch.asc

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3194>

Trust: 0.1

url:https://security.freebsd.org/patches/sa-15:26/openssl-10.1.patch.asc

Trust: 0.1

url:https://www.openssl.org/news/secadv/20151203.txt>

Trust: 0.1

url:https://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>

Trust: 0.1

url:https://security.freebsd.org/patches/sa-15:26/openssl-10.1.patch

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3196>

Trust: 0.1

url:https://security.freebsd.org/advisories/freebsd-sa-15:26.openssl.asc>

Trust: 0.1

url:https://security.freebsd.org/patches/sa-15:26/openssl-9.3.patch

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3195>

Trust: 0.1

url:https://security.freebsd.org/patches/sa-15:26/openssl-10.2.patch

Trust: 0.1

url:https://security.freebsd.org/patches/sa-15:26/openssl-9.3.patch.asc

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2842

Trust: 0.1

url:https://www.hp.com/go/hpsim

Trust: 0.1

url:https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

sources: CNVD: CNVD-2015-07950 // VULHUB: VHN-81156 // VULMON: CVE-2015-3195 // PACKETSTORM: 139115 // PACKETSTORM: 137292 // PACKETSTORM: 139114 // PACKETSTORM: 134650 // PACKETSTORM: 136992 // PACKETSTORM: 139116 // PACKETSTORM: 134783 // PACKETSTORM: 134632 // CNNVD: CNNVD-201512-075 // NVD: CVE-2015-3195

CREDITS

Red Hat

Trust: 0.4

sources: PACKETSTORM: 139115 // PACKETSTORM: 139114 // PACKETSTORM: 139116 // PACKETSTORM: 134783

SOURCES

db:CNVDid:CNVD-2015-07950
db:VULHUBid:VHN-81156
db:VULMONid:CVE-2015-3195
db:PACKETSTORMid:139115
db:PACKETSTORMid:137292
db:PACKETSTORMid:139114
db:PACKETSTORMid:134650
db:PACKETSTORMid:136992
db:PACKETSTORMid:139116
db:PACKETSTORMid:134783
db:PACKETSTORMid:134632
db:CNNVDid:CNNVD-201512-075
db:NVDid:CVE-2015-3195

LAST UPDATE DATE

2025-11-21T20:59:32.318000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-07950date:2015-12-07T00:00:00
db:VULHUBid:VHN-81156date:2022-12-13T00:00:00
db:VULMONid:CVE-2015-3195date:2023-11-07T00:00:00
db:CNNVDid:CNNVD-201512-075date:2022-12-14T00:00:00
db:NVDid:CVE-2015-3195date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-07950date:2015-12-07T00:00:00
db:VULHUBid:VHN-81156date:2015-12-06T00:00:00
db:VULMONid:CVE-2015-3195date:2015-12-06T00:00:00
db:PACKETSTORMid:139115date:2016-10-12T20:28:07
db:PACKETSTORMid:137292date:2016-06-02T19:12:12
db:PACKETSTORMid:139114date:2016-10-12T20:16:45
db:PACKETSTORMid:134650date:2015-12-06T13:33:33
db:PACKETSTORMid:136992date:2016-05-13T16:14:35
db:PACKETSTORMid:139116date:2016-10-12T23:44:55
db:PACKETSTORMid:134783date:2015-12-14T16:40:07
db:PACKETSTORMid:134632date:2015-12-04T17:22:00
db:CNNVDid:CNNVD-201512-075date:2015-12-07T00:00:00
db:NVDid:CVE-2015-3195date:2015-12-06T20:59:05.973