Lucene search

K
ubuntucveUbuntu.comUB:CVE-2015-0205
HistoryJan 08, 2015 - 12:00 a.m.

CVE-2015-0205

2015-01-0800:00:00
ubuntu.com
ubuntu.com
14

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.024 Low

EPSS

Percentile

89.7%

The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before
1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a
Diffie-Hellman (DH) certificate without requiring a CertificateVerify
message, which allows remote attackers to obtain access without knowledge
of a private key via crafted TLS Handshake Protocol traffic to a server
that recognizes a Certification Authority with DH support.

Notes

Author Note
mdeslaur precise isn’t actually affected, as the code used to be wrong, resulting in a no-op, and having the same result as this security fix. See the following commit: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=c2770c0e0e0da5f447227553c248f9a94504ee4e
OSVersionArchitecturePackageVersionFilename
ubuntu14.04noarchopenssl< 1.0.1f-1ubuntu2.8UNKNOWN
ubuntu14.10noarchopenssl< 1.0.1f-1ubuntu9.1UNKNOWN

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.024 Low

EPSS

Percentile

89.7%