Reachable Assertion Affecting openssl-libs package, versions <1:1.0.1e-42.el7_1.4
Snyk CVSS
Attack Complexity
Low
User Interaction
Required
Threat Intelligence
EPSS
52.19% (98th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS7-OPENSSLLIBS-2045361
- published 26 Jul 2021
- disclosed 19 Mar 2015
Introduced: 19 Mar 2015
CVE-2015-0293 Open this link in a new tabHow to fix?
Upgrade Centos:7
openssl-libs
to version 1:1.0.1e-42.el7_1.4 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs
package and not the openssl-libs
package as distributed by Centos
.
See How to fix?
for Centos:7
relevant fixed versions and status.
The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.
References
- APPLE
- BID
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CVE-2015-0293
- FEDORA
- FEDORA
- FEDORA
- FEDORA
- FEDORA
- FREEBSD
- GENTOO
- HP
- HP
- HP
- HP
- MANDRIVA
- MANDRIVA
- REDHAT
- REDHAT
- REDHAT
- REDHAT
- RHSA-2015:0716
- SECTRACK
- SUSE
- SUSE
- SUSE
- SUSE
- SUSE
- SUSE
- SUSE
- SUSE
- SUSE
- SUSE
- SUSE
- SUSE
- SUSE
- SUSE
- SUSE
- UBUNTU
- secalert@redhat.com
- secalert@redhat.com