Untrusted Pointer Dereference Affecting openssl-libs package, versions <1:1.0.1e-42.el7_1.4
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS7-OPENSSLLIBS-2045620
- published 26 Jul 2021
- disclosed 19 Mar 2015
How to fix?
Upgrade Centos:7
openssl-libs
to version 1:1.0.1e-42.el7_1.4 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl-libs
package and not the openssl-libs
package as distributed by Centos
.
See How to fix?
for Centos:7
relevant fixed versions and status.
The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.
References
- APPLE
- APPLE
- APPLE
- BID
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- CVE-2015-0286
- DEBIAN
- FEDORA
- FEDORA
- FEDORA
- FEDORA
- FEDORA
- FREEBSD
- HP
- HP
- HP
- HP
- HP
- HP
- MANDRIVA
- MANDRIVA
- REDHAT
- REDHAT
- REDHAT
- REDHAT
- RHSA-2015:0716
- SECTRACK
- SECTRACK
- SUSE
- SUSE
- SUSE
- SUSE
- SUSE
- UBUNTU
- secalert@redhat.com
- secalert@redhat.com