Bug 922490 (CVE-2015-0291) - VUL-1: CVE-2015-0291: openssl: [1.0.2 only] OpenSSL 1.0.2 ClientHello sigalgs DoS
Summary: VUL-1: CVE-2015-0291: openssl: [1.0.2 only] OpenSSL 1.0.2 ClientHello sigalgs...
Status: RESOLVED UPSTREAM
Alias: CVE-2015-0291
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2015-03-16 10:52 UTC by Marcus Meissner
Modified: 2015-03-23 10:19 UTC (History)
1 user (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 Vítězslav Čížek 2015-03-16 15:15:48 UTC
We don't ship openssl 1.0.2.
Comment 2 Swamp Workflow Management 2015-03-16 23:00:58 UTC
bugbot adjusting priority
Comment 3 Marcus Meissner 2015-03-19 14:06:38 UTC
OpenSSL 1.0.2 ClientHello sigalgs DoS (CVE-2015-0291)
=====================================================

Severity: High

If a client connects to an OpenSSL 1.0.2 server and renegotiates with an
invalid signature algorithms extension a NULL pointer dereference will occur.
This can be exploited in a DoS attack against the server.

This issue affects OpenSSL version: 1.0.2

OpenSSL 1.0.2 users should upgrade to 1.0.2a.

This issue was was reported to OpenSSL on 26th February 2015 by David Ramos
of Stanford University. The fix was developed by Stephen Henson and Matt
Caswell of the OpenSSL development team.
Comment 4 Marcus Meissner 2015-03-19 14:08:46 UTC
only 1.0.2 affected, which we did not ship before.
Comment 5 Marcus Meissner 2015-03-23 10:19:01 UTC
From: mancha <mancha1@zoho.com>
Subject: [oss-security] OpenSSL DoS tester now available (CVE-2015-0291)

Vendors/organizations interested in diagnosing exposure of their
OpenSSL-based services to the recently-disclosed sigalgs Dos
vulnerability (CVE-2015-0291) can use my clientnullo tester [1] and
read my brief write-up [2].

--mancha

[1] http://sf.net/projects/mancha/files/clientnullo.c
[2] https://mancha1.github.io/clientnullo.html