An integer underflow flaw, leading to a buffer overflow, was found in the way OpenSSL decoded malformed Base64-encoded inputs. An attacker able to make an application using OpenSSL decode a specially crafted Base64-encoded input (such as a PEM file) could use this flaw to cause the application to crash. Note: this flaw is not exploitable via the TLS/SSL protocol because the data being transferred is not Base64-encoded.
NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.
|Base Score:||5.1||Base Metrics:||AV:N/AC:H/Au:N/C:P/I:P/A:P|
|Access Vector:||Network||Attack Complexity:||High|
|Authentication:||None required||Confidentiality Impact:||Partial|
|Integrity Impact:||Partial||Availability Impact:||Partial|
|Oracle Linux version 5 (openssl)||ELSA-2015-0800||2015-04-13|
|Oracle Linux version 6 (openssl)||ELSA-2015-0715||2015-03-23|
|Oracle Linux version 6 (openssl-fips)||ELSA-2015-3022||2015-04-02|
|Oracle Linux version 7 (openssl)||ELSA-2015-0716||2015-03-23|
|Oracle VM version 3.3 (openssl)||OVMSA-2015-0039||2015-03-24|
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team