VYPR
Unrated severityNVD Advisory· Published Dec 6, 2015· Updated May 6, 2026

CVE-2015-3196

CVE-2015-3196

Description

ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (race condition and double free) via a crafted ServerKeyExchange message.

Affected products

64
  • cpe:2.3:a:hp:icewall_sso:10.0:*:*:*:certd:*:*:*
  • cpe:2.3:a:hp:icewall_sso_agent_option:10.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*+ 35 more
    • cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0o:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0p:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0q:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0r:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.0s:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*
    • cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
    Range: >=4.3.0,<=4.3.35
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*+ 3 more
    • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*+ 5 more
    • cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

25

News mentions

0

No linked articles in our index yet.