Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-1788

Опубликовано: 12 июн. 2015
Источник: ubuntu
Приоритет: medium
CVSS2: 4.3

Описание

The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.

РелизСтатусПримечание
artful

released

1.0.2c-1ubuntu1
bionic

released

1.0.2c-1ubuntu1
cosmic

released

1.0.2c-1ubuntu1
devel

released

1.0.2c-1ubuntu1
disco

released

1.0.2c-1ubuntu1
esm-infra-legacy/trusty

released

1.0.1f-1ubuntu2.15
esm-infra/bionic

released

1.0.2c-1ubuntu1
esm-infra/xenial

released

1.0.2c-1ubuntu1
precise

released

1.0.1-4ubuntu5.31
precise/esm

not-affected

1.0.1-4ubuntu5.31

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needed]
precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

ignored

end of standard support
trusty/esm

DNE

trusty was needed

Показывать по

4.3 Medium

CVSS2

Связанные уязвимости

redhat
больше 10 лет назад

The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.

nvd
больше 10 лет назад

The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.

debian
больше 10 лет назад

The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before ...

github
больше 3 лет назад

The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.

fstec
больше 10 лет назад

Уязвимость функции BN_GF2m_mod_inv библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

4.3 Medium

CVSS2