Lucene search

K
cve[email protected]CVE-2015-3216
HistoryJul 07, 2015 - 10:59 a.m.

CVE-2015-3216

2015-07-0710:59:00
CWE-189
CWE-362
web.nvd.nist.gov
104
cve-2015-3216
red hat
prng
openssl
race condition
denial of service
nvd
security vulnerability
rhel 7
tls sessions

7.2 High

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.121 Low

EPSS

Percentile

95.3%

Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.

7.2 High

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.121 Low

EPSS

Percentile

95.3%