Vulnerability Details : CVE-2015-0285
The ssl3_client_hello function in s3_clnt.c in OpenSSL 1.0.2 before 1.0.2a does not ensure that the PRNG is seeded before proceeding with a handshake, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and then conducting a brute-force attack.
Exploit prediction scoring system (EPSS) score for CVE-2015-0285
Probability of exploitation activity in the next 30 days: 0.62%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 77 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2015-0285
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2015-0285
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-0285
-
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
Oracle Critical Patch Update - January 2016Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
Oracle Solaris Third Party Bulletin - April 2015Third Party Advisory
-
http://www.securityfocus.com/bid/73234
OpenSSL CVE-2015-0285 Insufficient Entropy Security WeaknessThird Party Advisory;VDB Entry
-
http://marc.info/?l=bugtraq&m=143748090628601&w=2
'[security bulletin] HPSBMU03380 rev.1 - HP System Management Homepage (SMH) on Linux and Windows, Mu' - MARCMailing List;Third Party Advisory
-
https://security.gentoo.org/glsa/201503-11
OpenSSL: Multiple vulnerabilities (GLSA 201503-11) — Gentoo securityThird Party Advisory
-
http://www.securitytracker.com/id/1031929
OpenSSL Multiple Flaws Let Remote Users Deny Service - SecurityTrackerThird Party Advisory;VDB Entry
-
http://marc.info/?l=bugtraq&m=144050297101809&w=2
'[security bulletin] HPSBMU03397 rev.1 - HP Version Control Agent (VCA) on Windows and Linux, Multipl' - MARCMailing List;Third Party Advisory
-
https://bto.bluecoat.com/security-advisory/sa92
SA92 : OpenSSL Security Advisory 19-Mar-2015Third Party Advisory
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Oracle Critical Patch Update - October 2017Patch;Third Party Advisory
-
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=e1b568dd2462f7cacf98f3d117936c34e2849a6b
git.openssl.org Git - openssl.git/commitVendor Advisory
-
https://kc.mcafee.com/corporate/index?page=content&id=SB10110
McAfee Security Bulletin: Fourteen OpenSSL CVEs Announced on March 19, 2015Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1202410
1202410 – (CVE-2015-0285) CVE-2015-0285 openssl: handshake with unseeded PRNGIssue Tracking;Third Party Advisory
-
https://www.openssl.org/news/secadv_20150319.txt
Vendor Advisory
-
http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015
FortiGuardThird Party Advisory
-
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
Oracle Critical Patch Update - July 2015Third Party Advisory
-
http://marc.info/?l=bugtraq&m=144050155601375&w=2
'[security bulletin] HPSBMU03409 rev.1 - HP Matrix Operating Environment, Multiple Vulnerabilities' - MARCMailing List;Third Party Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
-
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
Oracle Critical Patch Update - October 2015Third Party Advisory
Products affected by CVE-2015-0285
- cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*