Moderate severityNVD Advisory· Published Oct 27, 2015· Updated May 6, 2026
CVE-2015-5262
CVE-2015-5262
Description
http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting during an SSL handshake, which allows remote attackers to cause a denial of service (HTTPS call hang) via unspecified vectors.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.httpcomponents:httpclientMaven | < 4.3.6 | 4.3.6 |
Affected products
27- ghsa-coords27 versionspkg:maven/org.apache.httpcomponents/httpclientpkg:rpm/opensuse/apache-commons-httpclient&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/apache-commons-httpclient&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/apache-commons-httpclient&distro=openSUSE%20Tumbleweedpkg:rpm/suse/apache-commons-httpclient&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/apache-commons-httpclient&distro=SUSE%20Enterprise%20Storage%205pkg:rpm/suse/apache-commons-httpclient&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/apache-commons-httpclient&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/apache-commons-httpclient&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/apache-commons-httpclient&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2pkg:rpm/suse/apache-commons-httpclient&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/apache-commons-httpclient&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/apache-commons-httpclient&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/apache-commons-httpclient&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/apache-commons-httpclient&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/apache-commons-httpclient&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/apache-commons-httpclient&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/apache-commons-httpclient&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/apache-commons-httpclient&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/apache-commons-httpclient&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/apache-commons-httpclient&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/apache-commons-httpclient&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/apache-commons-httpclient&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/apache-commons-httpclient&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/apache-commons-httpclient&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/apache-commons-httpclient&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208pkg:rpm/suse/apache-commons-httpclient&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209
< 4.3.6+ 26 more
- (no CPE)range: < 4.3.6
- (no CPE)range: < 3.1-lp151.4.3.1
- (no CPE)range: < 3.1-lp152.6.3.1
- (no CPE)range: < 3.1-13.4
- (no CPE)range: < 3.1-6.3.1
- (no CPE)range: < 3.1-6.3.1
- (no CPE)range: < 3.1-4.3.2
- (no CPE)range: < 3.1-4.3.2
- (no CPE)range: < 3.1-4.3.2
- (no CPE)range: < 3.1-11.3.2
- (no CPE)range: < 3.1-6.3.1
- (no CPE)range: < 3.1-6.3.1
- (no CPE)range: < 3.1-6.3.1
- (no CPE)range: < 3.1-6.3.1
- (no CPE)range: < 3.1-6.3.1
- (no CPE)range: < 3.1-6.3.1
- (no CPE)range: < 3.1-4.3.2
- (no CPE)range: < 3.1-6.3.1
- (no CPE)range: < 3.1-6.3.1
- (no CPE)range: < 3.1-6.3.1
- (no CPE)range: < 3.1-6.3.1
- (no CPE)range: < 3.1-4.3.2
- (no CPE)range: < 3.1-6.3.1
- (no CPE)range: < 3.1-6.3.1
- (no CPE)range: < 3.1-6.3.1
- (no CPE)range: < 3.1-6.3.1
- (no CPE)range: < 3.1-6.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
21- lists.fedoraproject.org/pipermail/package-announce/2015-October/167962.htmlnvdThird Party AdvisoryWEB
- lists.fedoraproject.org/pipermail/package-announce/2015-October/167999.htmlnvdThird Party AdvisoryWEB
- lists.fedoraproject.org/pipermail/package-announce/2015-October/168030.htmlnvdThird Party AdvisoryWEB
- svn.apache.org/viewvcnvdVendor AdvisoryWEB
- www.securitytracker.com/id/1033743nvdThird Party AdvisoryVDB EntryWEB
- www.ubuntu.com/usn/USN-2769-1nvdThird Party AdvisoryWEB
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingThird Party AdvisoryWEB
- github.com/advisories/GHSA-fmj5-wv96-r2chghsaADVISORY
- issues.apache.org/jira/browse/HTTPCLIENT-1478nvdVendor AdvisoryWEB
- jenkins.io/security/advisory/2018-02-26/nvdThird Party Advisory
- nvd.nist.gov/vuln/detail/CVE-2015-5262ghsaADVISORY
- lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.htmlnvdWEB
- lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.htmlnvdWEB
- www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlnvdWEB
- jenkins.io/security/advisory/2018-02-26ghsaWEB
- lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3EnvdWEB
- lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3EghsaWEB
- lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3EnvdWEB
- lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3EghsaWEB
- lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3EnvdWEB
- lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3EghsaWEB
News mentions
0No linked articles in our index yet.