A NULL pointer derefernce flaw was found in the way OpenSSL verified signatures using the RSA PSS algorithm. A remote attacked could possibly use this flaw to crash a TLS/SSL client using OpenSSL, or a TLS/SSL server using OpenSSL if it enabled client authentication. (CVE-2015-3194)
A memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and CMS data. A remote attacker could use this flaw to cause an application that parses PKCS#7 or CMS data from untrusted sources to use an excessive amount of memory and possibly crash. (CVE-2015-3195)
A race condition flaw, leading to a double free, was found in the way OpenSSL handled pre-shared key (PSK) identify hints. A remote attacker could use this flaw to crash a multi-threaded SSL/TLS client using OpenSSL. (CVE-2015-3196)
The OpenSSL toolkit provides support for secure communications between machines. OpenSSL includes a certificate management tool and shared libraries which provide various cryptographic algorithms and protocols.
Please login to add feedback.
|submitted||3 years ago|
|in testing||3 years ago|
|in stable||3 years ago|
|0||0||#1223990 Review Request: openssl101e - A general purpose cryptography library with TLS implementation|
|0||0||#1288320 CVE-2015-3194 OpenSSL: Certificate verify crash with missing PSS parameter|
|0||0||#1288322 CVE-2015-3195 OpenSSL: X509_ATTRIBUTE memory leak|
|0||0||#1288326 CVE-2015-3196 OpenSSL: Race condition handling PSK identify hint|