Логотип exploitDog
bind:"BDU:2026-01215" OR bind:"CVE-2025-15468"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2026-01215" OR bind:"CVE-2025-15468"

Количество 12

Количество 12

fstec логотип

BDU:2026-01215

около 2 месяцев назад

Уязвимость функции SSL_CIPHER_find() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.9
EPSS: Низкий
ubuntu логотип

CVE-2025-15468

14 дней назад

Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs. Impact summary: A NULL pointer dereference leads to abnormal termination of the running process causing Denial of Service. Some applications call SSL_CIPHER_find() from the client_hello_cb callback on the cipher ID received from the peer. If this is done with an SSL object implementing the QUIC protocol, NULL pointer dereference will happen if the examined cipher ID is unknown or unsupported. As it is not very common to call this function in applications using the QUIC protocol and the worst outcome is Denial of Service, the issue was assessed as Low severity. The vulnerable code was introduced in the 3.2 version with the addition of the QUIC protocol support. The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue, as the QUIC implementation is outside the OpenSSL FIPS module boundary. O...

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2025-15468

14 дней назад

Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs. Impact summary: A NULL pointer dereference leads to abnormal termination of the running process causing Denial of Service. Some applications call SSL_CIPHER_find() from the client_hello_cb callback on the cipher ID received from the peer. If this is done with an SSL object implementing the QUIC protocol, NULL pointer dereference will happen if the examined cipher ID is unknown or unsupported. As it is not very common to call this function in applications using the QUIC protocol and the worst outcome is Denial of Service, the issue was assessed as Low severity. The vulnerable code was introduced in the 3.2 version with the addition of the QUIC protocol support. The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue, as the QUIC implementation is outside the OpenSSL FIPS module boundary

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2025-15468

14 дней назад

Issue summary: If an application using the SSL_CIPHER_find() function ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-rhx3-fg8p-f9m4

14 дней назад

Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs. Impact summary: A NULL pointer dereference leads to abnormal termination of the running process causing Denial of Service. Some applications call SSL_CIPHER_find() from the client_hello_cb callback on the cipher ID received from the peer. If this is done with an SSL object implementing the QUIC protocol, NULL pointer dereference will happen if the examined cipher ID is unknown or unsupported. As it is not very common to call this function in applications using the QUIC protocol and the worst outcome is Denial of Service, the issue was assessed as Low severity. The vulnerable code was introduced in the 3.2 version with the addition of the QUIC protocol support. The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue, as the QUIC implementation is outside the OpenSSL FIPS module bound...

CVSS3: 5.9
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2026:20152-1

8 дней назад

Security update for openssl-3

EPSS: Низкий
rocky логотип

RLSA-2026:1472

10 дней назад

Important: openssl security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-50081

11 дней назад

ELSA-2026-50081: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-50080

11 дней назад

ELSA-2026-50080: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-50075

12 дней назад

ELSA-2026-50075: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1473

13 дней назад

ELSA-2026-1473: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-1472

13 дней назад

ELSA-2026-1472: openssl security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2026-01215

Уязвимость функции SSL_CIPHER_find() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.9
0%
Низкий
около 2 месяцев назад
ubuntu логотип
CVE-2025-15468

Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs. Impact summary: A NULL pointer dereference leads to abnormal termination of the running process causing Denial of Service. Some applications call SSL_CIPHER_find() from the client_hello_cb callback on the cipher ID received from the peer. If this is done with an SSL object implementing the QUIC protocol, NULL pointer dereference will happen if the examined cipher ID is unknown or unsupported. As it is not very common to call this function in applications using the QUIC protocol and the worst outcome is Denial of Service, the issue was assessed as Low severity. The vulnerable code was introduced in the 3.2 version with the addition of the QUIC protocol support. The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue, as the QUIC implementation is outside the OpenSSL FIPS module boundary. O...

CVSS3: 5.9
0%
Низкий
14 дней назад
nvd логотип
CVE-2025-15468

Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs. Impact summary: A NULL pointer dereference leads to abnormal termination of the running process causing Denial of Service. Some applications call SSL_CIPHER_find() from the client_hello_cb callback on the cipher ID received from the peer. If this is done with an SSL object implementing the QUIC protocol, NULL pointer dereference will happen if the examined cipher ID is unknown or unsupported. As it is not very common to call this function in applications using the QUIC protocol and the worst outcome is Denial of Service, the issue was assessed as Low severity. The vulnerable code was introduced in the 3.2 version with the addition of the QUIC protocol support. The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue, as the QUIC implementation is outside the OpenSSL FIPS module boundary

CVSS3: 5.9
0%
Низкий
14 дней назад
debian логотип
CVE-2025-15468

Issue summary: If an application using the SSL_CIPHER_find() function ...

CVSS3: 5.9
0%
Низкий
14 дней назад
github логотип
GHSA-rhx3-fg8p-f9m4

Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs. Impact summary: A NULL pointer dereference leads to abnormal termination of the running process causing Denial of Service. Some applications call SSL_CIPHER_find() from the client_hello_cb callback on the cipher ID received from the peer. If this is done with an SSL object implementing the QUIC protocol, NULL pointer dereference will happen if the examined cipher ID is unknown or unsupported. As it is not very common to call this function in applications using the QUIC protocol and the worst outcome is Denial of Service, the issue was assessed as Low severity. The vulnerable code was introduced in the 3.2 version with the addition of the QUIC protocol support. The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue, as the QUIC implementation is outside the OpenSSL FIPS module bound...

CVSS3: 5.9
0%
Низкий
14 дней назад
suse-cvrf логотип
openSUSE-SU-2026:20152-1

Security update for openssl-3

8 дней назад
rocky логотип
RLSA-2026:1472

Important: openssl security update

10 дней назад
oracle-oval логотип
ELSA-2026-50081

ELSA-2026-50081: openssl security update (IMPORTANT)

11 дней назад
oracle-oval логотип
ELSA-2026-50080

ELSA-2026-50080: openssl security update (IMPORTANT)

11 дней назад
oracle-oval логотип
ELSA-2026-50075

ELSA-2026-50075: openssl security update (IMPORTANT)

12 дней назад
oracle-oval логотип
ELSA-2026-1473

ELSA-2026-1473: openssl security update (IMPORTANT)

13 дней назад
oracle-oval логотип
ELSA-2026-1472

ELSA-2026-1472: openssl security update (IMPORTANT)

13 дней назад

Уязвимостей на страницу