Vulnerability Details : CVE-2015-1182
The asn1_get_sequence_of function in library/asn1parse.c in PolarSSL 1.0 through 1.2.12 and 1.3.x through 1.3.9 does not properly initialize a pointer in the asn1_sequence linked list, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ASN.1 sequence in a certificate.
Vulnerability category: Execute codeDenial of service
Products affected by CVE-2015-1182
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.1.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.1.0:rc0:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.3.0:alpha1:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.3.0:rc0:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:polarssl:polarssl:1.3.9:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-1182
4.46%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 88 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-1182
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2015-1182
-
http://secunia.com/advisories/62270
Sign in
-
https://security.gentoo.org/glsa/201801-15
PolarSSL: Multiple vulnerabilities (GLSA 201801-15) — Gentoo security
-
http://www.debian.org/security/2015/dsa-3136
Debian -- Security Information -- DSA-3136-1 polarsslVendor Advisory
-
http://lists.opensuse.org/opensuse-updates/2015-02/msg00003.html
openSUSE-SU-2015:0186-1: moderate: Security update for polarssl
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148829.html
[SECURITY] Fedora 20 Update: polarssl-1.2.12-3.fc20
-
https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2014-04
PolarSSL Security Advisory 2014-04 - Tech Updates - Mbed TLS (Previously PolarSSL)Vendor Advisory
-
http://secunia.com/advisories/62610
Sign in
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148903.html
[SECURITY] Fedora 21 Update: polarssl-1.3.9-3.fc21
Jump to