Bug 1202338 (CVE-2015-0291)

Summary: CVE-2015-0291 openssl: ClientHello sigalgs NULL pointer dereference DoS
Product: [Other] Security Response Reporter: Martin Prpič <mprpic>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: aavati, acathrow, alonbl, bazulay, bmcclain, cdewolf, cfergeau, dandread, darran.lofthouse, dblechte, dknox, ecohen, erik-fedora, gklein, idith, iheim, jason.greene, jawilson, jboss-set, jclere, jdoyle, ktietz, lfarkas, lgao, lsurette, marcandre.lureau, michal.skrivanek, myarboro, nlevinki, pgier, pslavice, rbalakri, rfortier, rhs-bugs, rh-spice-bugs, rjones, rsvoboda, security-response-team, sgirijan, smohan, ssaha, tmraz, twalsh, vbellur, vtunka, weli, yeylon
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=important,public=20150319,reported=20150316,source=upstream,cvss2=5/AV:N/AC:L/Au:N/C:N/I:N/A:P,cwe=CWE-476,rhel-4/openssl=notaffected,rhel-5/openssl=notaffected,rhel-5/openssl097a=notaffected,rhel-6/openssl=notaffected,rhel-6/openssl098e=notaffected,rhel-7/openssl=notaffected,rhel-7/openssl098e=notaffected,fedora-all/openssl=notaffected,fedora-all/mingw-openssl=notaffected,epel-7/mingw-openssl=notaffected,eap-6/openssl=notaffected,jbews-1/openssl=notaffected,jbews-2/openssl=notaffected,jbews-3/openssl=notaffected,rhes-2.1/openssl=notaffected,rhev-m-3/mingw-virt-viewer=notaffected
Fixed In Version: openssl 1.0.2a Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-03-17 08:09:42 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---
Bug Depends On:    
Bug Blocks: 1202442    

Description Martin Prpič 2015-03-16 12:44:52 UTC
A NULL pointer dereference flaw was found in the way OpenSSL handled renegotiation requests with an invalid Signature Algorithms extension. A remote attacker could use this flaw to cause an OpenSSL server to crash.

This issue affects OpenSSL version 1.0.2, and was fixed in version 1.0.2a.


Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges David Ramos of Stanford University as the original reporter.

Comment 1 Tomas Hoger 2015-03-17 08:06:36 UTC
Affected code was introduced upstream in version 1.0.2 via this commit:


It does not existing in openssl packages in Red Hat Enterprise Linux 7 and earlier.


This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 5, 6, and 7.