Vulnerability Details : CVE-2015-3216
Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.
Vulnerability category: Denial of service
Products affected by CVE-2015-3216
- cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1e-25.el7:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-3216
12.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-3216
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2015-3216
-
Assigned by: nvd@nist.gov (Primary)
-
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-3216
-
https://bugzilla.redhat.com/show_bug.cgi?id=1225994
1225994 – segfault in ssleay_rand_bytes due to locking regression
-
http://www.securitytracker.com/id/1032587
Red Hat OpenSSL Locking Error in ssleay_rand_bytes() Lets Remote Users Deny Service - SecurityTracker
-
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html
[security-announce] SUSE-SU-2015:1150-1: important: Security update for
-
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html
[security-announce] openSUSE-SU-2015:1139-1: important: Security update
-
http://rhn.redhat.com/errata/RHSA-2016-2957.html
RHSA-2016:2957 - Security Advisory - Red Hat Customer Portal
-
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html
[security-announce] SUSE-SU-2015:1184-1: important: Security update for
-
http://rhn.redhat.com/errata/RHSA-2015-1115.html
RHSA-2015:1115 - Security Advisory - Red Hat Customer Portal
-
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html
[security-announce] SUSE-SU-2015:1143-1: important: Security update for
-
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html
[security-announce] SUSE-SU-2015:1182-1: important: Security update for
-
http://www.securityfocus.com/bid/75219
OpenSSL 'ssleay_rand_bytes()' Function Denial of Service Vulnerability
Jump to