Vulnerability Details : CVE-2015-3193
The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.
Vulnerability category: Information leak
Exploit prediction scoring system (EPSS) score for CVE-2015-3193
Probability of exploitation activity in the next 30 days: 0.45%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 72 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2015-3193
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2015-3193
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-3193
-
http://www.fortiguard.com/advisory/openssl-advisory-december-2015
FortiGuardThird Party Advisory
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
Juniper Networks - 2016-10 Security Bulletin: CTPView: Multiple vulnerabilities in CTPViewThird Party Advisory
-
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
cpuapr2016v3Patch;Third Party Advisory
-
http://www.securityfocus.com/bid/91787
Oracle July 2016 Critical Patch Update Multiple VulnerabilitiesThird Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1034294
OpenSSL Multiple Bugs Let Remote Users Deny Service and Obtain Potentially Sensitive Information - SecurityTrackerThird Party Advisory;VDB Entry
-
https://blog.fuzzing-project.org/31-Fuzzing-Math-miscalculations-in-OpenSSLs-BN_mod_exp-CVE-2015-3193.html
Fuzzing Math - miscalculations in OpenSSL's BN_mod_exp (CVE-2015-3193) | The Fuzzing ProjectThird Party Advisory
-
https://kb.isc.org/article/AA-01438
404 Page not foundThird Party Advisory
-
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.539966
The Slackware Linux Project: Slackware Security AdvisoriesThird Party Advisory
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Oracle Critical Patch Update - October 2017Patch;Third Party Advisory
-
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
Oracle Critical Patch Update - July 2016Patch;Third Party Advisory
-
http://openssl.org/news/secadv/20151203.txt
Vendor Advisory
-
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100
Pulse Security Advisory: SA40100 - [Pulse Secure] December 3rd 2015 OpenSSL Security AdvisoryThird Party Advisory
-
http://www.securityfocus.com/bid/78705
OpenSSL CVE-2015-3193 Information Disclosure VulnerabilityThird Party Advisory;VDB Entry
-
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322
SorryThird Party Advisory
-
http://fortiguard.com/advisory/openssl-advisory-december-2015
FortiGuardThird Party Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
-
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.754583
The Slackware Linux Project: Slackware Security AdvisoriesThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1288317
1288317 – (CVE-2015-3193) CVE-2015-3193 OpenSSL: BN_mod_exp may produce incorrect results on x86_64Issue Tracking;Third Party Advisory
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
Juniper Networks - 2016-10 Security Bulletin: OpenSSL security updatesThird Party Advisory
-
http://www.ubuntu.com/usn/USN-2830-1
USN-2830-1: OpenSSL vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-openssl
Multiple Vulnerabilities in OpenSSL (December 2015) Affecting Cisco ProductsThird Party Advisory
-
https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=d73cc256c8e256c32ed959456101b73ba9842f72
git.openssl.org Git
Products affected by CVE-2015-3193
- cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
- cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
- cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*