ID CVE-2015-3196
Summary ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (race condition and double free) via a crafted ServerKeyExchange message.
References
Vulnerable Configurations
  • cpe:2.3:a:hp:icewall_sso:10.0:*:*:*:certd:*:*:*
    cpe:2.3:a:hp:icewall_sso:10.0:*:*:*:certd:*:*:*
  • cpe:2.3:a:hp:icewall_sso_agent_option:10.0:*:*:*:*:*:*:*
    cpe:2.3:a:hp:icewall_sso_agent_option:10.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0o:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0o:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0p:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0p:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0q:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0q:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0r:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0r:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0s:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.0s:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:4.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:4.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:4.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:4.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:4.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:4.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:4.3.8:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:4.3.8:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:4.3.10:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:4.3.10:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:4.3.12:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:4.3.12:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:4.3.14:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:4.3.14:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:4.3.16:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:4.3.16:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:4.3.18:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:4.3.18:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:4.3.22:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:4.3.22:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:4.3.24:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:4.3.24:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:4.3.26:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:4.3.26:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:4.3.28:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:4.3.28:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:4.3.29:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:4.3.29:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:4.3.30:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:4.3.30:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:4.3.32:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:4.3.32:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:4.3.34:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:4.3.34:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:4.3.35:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:4.3.35:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:5.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:5.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:5.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:5.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:5.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:5.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:5.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:5.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:5.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:5.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:5.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:5.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:5.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:5.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:5.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:vm_virtualbox:5.0.13:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 13-06-2019 - 18:15)
Impact:
Exploitability:
CWE CWE-362
CAPEC
  • Leveraging Race Conditions
    This attack targets a race condition occurring when multiple processes access and manipulate the same resource concurrently and the outcome of the execution depends on the particular order in which the access takes place. The attacker can leverage a race condition by "running the race", modifying the resource and modifying the normal execution flow. For instance a race condition can occur while accessing a file, the attacker can trick the system by replacing the original file with his version and cause the system to read the malicious file.
  • Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
    This attack targets a race condition occurring between the time of check (state) for a resource and the time of use of a resource. The typical example is the file access. The attacker can leverage a file access race condition by "running the race", meaning that he would modify the resource between the first time the target program accesses the file and the time the target program uses the file. During that period of time, the attacker could do something such as replace the file and cause an escalation of privilege.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:N/A:P
redhat via4
advisories
  • bugzilla
    id 1288326
    title CVE-2015-3196 OpenSSL: Race condition handling PSK identify hint
    oval
    OR
    • AND
      • OR
        • comment Red Hat Enterprise Linux 6 Client is installed
          oval oval:com.redhat.rhba:tst:20111656001
        • comment Red Hat Enterprise Linux 6 Server is installed
          oval oval:com.redhat.rhba:tst:20111656002
        • comment Red Hat Enterprise Linux 6 Workstation is installed
          oval oval:com.redhat.rhba:tst:20111656003
        • comment Red Hat Enterprise Linux 6 ComputeNode is installed
          oval oval:com.redhat.rhba:tst:20111656004
      • OR
        • AND
          • comment openssl is earlier than 0:1.0.1e-42.el6_7.1
            oval oval:com.redhat.rhsa:tst:20152617005
          • comment openssl is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100888006
        • AND
          • comment openssl-devel is earlier than 0:1.0.1e-42.el6_7.1
            oval oval:com.redhat.rhsa:tst:20152617009
          • comment openssl-devel is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100888012
        • AND
          • comment openssl-perl is earlier than 0:1.0.1e-42.el6_7.1
            oval oval:com.redhat.rhsa:tst:20152617011
          • comment openssl-perl is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100888008
        • AND
          • comment openssl-static is earlier than 0:1.0.1e-42.el6_7.1
            oval oval:com.redhat.rhsa:tst:20152617007
          • comment openssl-static is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100888010
    • AND
      • OR
        • comment Red Hat Enterprise Linux 7 Client is installed
          oval oval:com.redhat.rhba:tst:20150364001
        • comment Red Hat Enterprise Linux 7 Server is installed
          oval oval:com.redhat.rhba:tst:20150364002
        • comment Red Hat Enterprise Linux 7 Workstation is installed
          oval oval:com.redhat.rhba:tst:20150364003
        • comment Red Hat Enterprise Linux 7 ComputeNode is installed
          oval oval:com.redhat.rhba:tst:20150364004
      • OR
        • AND
          • comment openssl is earlier than 1:1.0.1e-51.el7_2.1
            oval oval:com.redhat.rhsa:tst:20152617017
          • comment openssl is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100888006
        • AND
          • comment openssl-devel is earlier than 1:1.0.1e-51.el7_2.1
            oval oval:com.redhat.rhsa:tst:20152617019
          • comment openssl-devel is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100888012
        • AND
          • comment openssl-libs is earlier than 1:1.0.1e-51.el7_2.1
            oval oval:com.redhat.rhsa:tst:20152617021
          • comment openssl-libs is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20140679014
        • AND
          • comment openssl-perl is earlier than 1:1.0.1e-51.el7_2.1
            oval oval:com.redhat.rhsa:tst:20152617018
          • comment openssl-perl is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100888008
        • AND
          • comment openssl-static is earlier than 1:1.0.1e-51.el7_2.1
            oval oval:com.redhat.rhsa:tst:20152617020
          • comment openssl-static is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100888010
    rhsa
    id RHSA-2015:2617
    released 2015-12-14
    severity Moderate
    title RHSA-2015:2617: openssl security update (Moderate)
  • rhsa
    id RHSA-2016:2957
rpms
  • openssl-0:1.0.1e-42.el6_7.1
  • openssl-devel-0:1.0.1e-42.el6_7.1
  • openssl-perl-0:1.0.1e-42.el6_7.1
  • openssl-static-0:1.0.1e-42.el6_7.1
  • openssl-1:1.0.1e-51.el7_2.1
  • openssl-devel-1:1.0.1e-51.el7_2.1
  • openssl-libs-1:1.0.1e-51.el7_2.1
  • openssl-perl-1:1.0.1e-51.el7_2.1
  • openssl-static-1:1.0.1e-51.el7_2.1
refmap via4
bid 78622
cisco 20151204 Multiple Vulnerabilities in OpenSSL (December 2015) Affecting Cisco Products
confirm
debian DSA-3413
fedora FEDORA-2015-d87d60b9a9
hp HPSBGN03536
sectrack 1034294
slackware SSA:2015-349-04
suse
  • openSUSE-SU-2015:2288
  • openSUSE-SU-2015:2289
ubuntu USN-2830-1
Last major update 13-06-2019 - 18:15
Published 06-12-2015 - 20:59
Back to Top