OpenSSL vulnerability [CVE-2015-1791]

Advisory ID CVE Number Date discovered Severity Advisory revision
STORM-2015-007 CVE-2015-1791 06/12/2015 low v1

Vulnerability details

This vulnerability impacts OpenSSL while handling NewSessionTicket messages. More precisely, if a NewSessionTicket is received by a multi-threaded client when attempting to reuse a previous one, then a race condition can occur. This potentially leads to a denial of service.

Impacted products

ProductsSeverityDetail
Stormshield Network Security low The product uses client cache in SSL proxy
Netasq low The product uses client cache in SSL proxy.

Revisions

Version Date Description
v1  06/17/2015 Initial release


Stormshield Network Security

CVSS v2 Overall Score: 2.2      

Analysis

Impacted version

A NewSessionTicket can change session ID for a session already in the client session cache. This could lead to a crash of SSL proxy.

  • SNS 1.0 to 1.3.2
  • SNS 2.1

Workaround solution

Solution

There is no workaround solution.

The v1.3.3 and v2.1.1 will fix this vulnerability.



Access vector Access complexity Authentication Confidentiality impact Integrity impact Availability impact
Network High None None None Partial
CVSS Base score: 2.6 CVSS Vector: (AV:N/AC:H/Au:N/C:N/I:N/A:P)
Exploitability Remediation Level Report Confidence
Unproven that exploit exists Unavailable Confirmed
CVSS Temporal score: 2.2 CVSS Vector: (AV:N/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:U/RC:C)
Collateral Damage Potential Target Distribution
None High [76-100%]
CVSS Environmental score: 2.2 CVSS Vector: (AV:N/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:U/RC:C/CDP:N/TD:H/CR:ND/IR:ND/AR:ND)


Netasq

CVSS v2 Overall Score: 2.2      

Analysis

Impacted version

A NewSessionTicket can change session ID for a session already in the client session cache. This could lead to a crash of SSL proxy.

  • Netasq v8.0.0 are not impacted
  • Netasq v9.0.0 and above
  • Netasq v9.1.0 to v9.1.5.1

Workaround solution

Solution

There is no workaround solution.

The 9.1.5.2 (release) will fix this vulnerability.



Access vector Access complexity Authentication Confidentiality impact Integrity impact Availability impact
Network High None None None Partial
CVSS Base score: 2.6 CVSS Vector: (AV:N/AC:H/Au:N/C:N/I:N/A:P)
Exploitability Remediation Level Report Confidence
Unproven that exploit exists Unavailable Confirmed
CVSS Temporal score: 2.2 CVSS Vector: (AV:N/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:U/RC:C)
Collateral Damage Potential Target Distribution
None High [76-100%]
CVSS Environmental score: 2.2 CVSS Vector: (AV:N/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:U/RC:C/CDP:N/TD:H/CR:ND/IR:ND/AR:ND)