Description
crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.
Published: 2015-12-06
Score: 7.5 High
EPSS: 51.9% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-3413-1 openssl security update
Ubuntu USN Ubuntu USN USN-2830-1 OpenSSL vulnerabilities
References
Link Providers
http://fortiguard.com/advisory/openssl-advisory-december-2015 cve-icon cve-icon
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 cve-icon cve-icon
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761 cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173801.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-updates/2015-12/msg00087.html cve-icon cve-icon
http://marc.info/?l=bugtraq&m=145382583417444&w=2 cve-icon cve-icon
http://openssl.org/news/secadv/20151203.txt cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-2617.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-2957.html cve-icon cve-icon
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-openssl cve-icon cve-icon
http://www.debian.org/security/2015/dsa-3413 cve-icon cve-icon
http://www.fortiguard.com/advisory/openssl-advisory-december-2015 cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html cve-icon cve-icon
http://www.securityfocus.com/bid/78623 cve-icon cve-icon
http://www.securityfocus.com/bid/91787 cve-icon cve-icon
http://www.securitytracker.com/id/1034294 cve-icon cve-icon
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.754583 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2830-1 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=1288320 cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf cve-icon cve-icon
https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c394a488942387246653833359a5c94b5832674e cve-icon cve-icon
https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=d8541d7e9e63bf5f343af24644046c8d96498c17 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944173 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322 cve-icon cve-icon
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2015-3194 cve-icon
https://openssl.org/news/secadv/20151203.txt cve-icon
https://www.cve.org/CVERecord?id=CVE-2015-3194 cve-icon
History

No history.

Subscriptions

Canonical Ubuntu Linux
Debian Debian Linux
Nodejs Node.js
Openssl Openssl
Redhat Enterprise Linux Jboss Core Services
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T05:39:31.986Z

Reserved: 2015-04-10T00:00:00.000Z

Link: CVE-2015-3194

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2015-12-06T20:59:04.707

Modified: 2026-05-06T22:30:45.220

Link: CVE-2015-3194

cve-icon Redhat

Severity : Low

Publid Date: 2016-01-28T00:00:00Z

Links: CVE-2015-3194 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses