5.3
CVE-2015-3195
- EPSS 3.48%
- Veröffentlicht 06.12.2015 20:59:05
- Zuletzt bearbeitet 12.04.2025 10:46:40
- Quelle secalert@redhat.com
- Teams Watchlist Login
- Unerledigt Login
The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Oracle ≫ Api Gateway Version11.1.2.3.0
Oracle ≫ Api Gateway Version11.1.2.4.0
Oracle ≫ Communications Webrtc Session Controller Version7.0
Oracle ≫ Communications Webrtc Session Controller Version7.1
Oracle ≫ Communications Webrtc Session Controller Version7.2
Oracle ≫ Exalogic Infrastructure Version1.0
Oracle ≫ Exalogic Infrastructure Version2.0
Oracle ≫ HTTP Server Version11.5.10.2
Oracle ≫ Life Sciences Data Hub Version2.1
Oracle ≫ Sun Ray Software Version11.1
Oracle ≫ Transportation Management Version6.1
Oracle ≫ Transportation Management Version6.2
Oracle ≫ Vm Virtualbox Version < 4.3.36
Oracle ≫ Vm Virtualbox Version >= 5.0.0 < 5.0.14
Oracle ≫ Integrated Lights Out Manager Firmware Version >= 3.0 <= 4.0.4
Redhat ≫ Enterprise Linux Desktop Version5.0
Redhat ≫ Enterprise Linux Desktop Version6.0
Redhat ≫ Enterprise Linux Desktop Version7.0
Redhat ≫ Enterprise Linux Server Version5.0
Redhat ≫ Enterprise Linux Server Version6.0
Redhat ≫ Enterprise Linux Server Version7.0
Redhat ≫ Enterprise Linux Server Aus Version7.2
Redhat ≫ Enterprise Linux Server Aus Version7.3
Redhat ≫ Enterprise Linux Server Aus Version7.4
Redhat ≫ Enterprise Linux Server Aus Version7.6
Redhat ≫ Enterprise Linux Server Aus Version7.7
Redhat ≫ Enterprise Linux Server Tus Version7.2
Redhat ≫ Enterprise Linux Server Tus Version7.3
Redhat ≫ Enterprise Linux Server Tus Version7.6
Redhat ≫ Enterprise Linux Server Tus Version7.7
Redhat ≫ Enterprise Linux Workstation Version5.0
Redhat ≫ Enterprise Linux Workstation Version6.0
Redhat ≫ Enterprise Linux Workstation Version7.0
Canonical ≫ Ubuntu Linux Version12.04 SwEdition-
Canonical ≫ Ubuntu Linux Version14.04 SwEditionesm
Canonical ≫ Ubuntu Linux Version15.04
Canonical ≫ Ubuntu Linux Version15.10
Debian ≫ Debian Linux Version7.0
Debian ≫ Debian Linux Version8.0
Suse ≫ Linux Enterprise Server Version10 Updatesp4 SwEditionltss
Fedoraproject ≫ Fedora Version22
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 3.48% | 0.871 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.