OpenSSL vulnerability [CVE-2015-1791]
Advisory ID | CVE Number | Date discovered | Severity | Advisory revision |
---|---|---|---|---|
STORM-2015-007 | CVE-2015-1791 | 06/12/2015 | low | v1 |
Vulnerability details
This vulnerability impacts OpenSSL while handling NewSessionTicket messages. More precisely, if a NewSessionTicket is received by a multi-threaded client when attempting to reuse a previous one, then a race condition can occur. This potentially leads to a denial of service.
Impacted products
Products | Severity | Detail |
---|---|---|
Stormshield Network Security | low | The product uses client cache in SSL proxy |
Netasq | low | The product uses client cache in SSL proxy. |
Revisions
Version | Date | Description |
---|---|---|
v1 | 06/17/2015 | Initial release |

Stormshield Network Security |
CVSS v2 Overall Score: 2.2
|
Analysis |
Impacted version |
A NewSessionTicket can change session ID for a session already in the client session cache. This could lead to a crash of SSL proxy. |
|
Workaround solution |
Solution |
There is no workaround solution. |
The v1.3.3 and v2.1.1 will fix this vulnerability. |
Access vector | Access complexity | Authentication | Confidentiality impact | Integrity impact | Availability impact |
---|---|---|---|---|---|
Network | High | None | None | None | Partial |
CVSS Base score: 2.6 | CVSS Vector: (AV:N/AC:H/Au:N/C:N/I:N/A:P) |
Exploitability | Remediation Level | Report Confidence |
---|---|---|
Unproven that exploit exists | Unavailable | Confirmed |
CVSS Temporal score: 2.2 | CVSS Vector: (AV:N/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:U/RC:C) |
Collateral Damage Potential | Target Distribution |
---|---|
None | High [76-100%] |
CVSS Environmental score: 2.2 | CVSS Vector: (AV:N/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:U/RC:C/CDP:N/TD:H/CR:ND/IR:ND/AR:ND) |

Netasq |
CVSS v2 Overall Score: 2.2
|
Analysis |
Impacted version |
A NewSessionTicket can change session ID for a session already in the client session cache. This could lead to a crash of SSL proxy. |
|
Workaround solution |
Solution |
There is no workaround solution. |
The 9.1.5.2 (release) will fix this vulnerability. |
Access vector | Access complexity | Authentication | Confidentiality impact | Integrity impact | Availability impact |
---|---|---|---|---|---|
Network | High | None | None | None | Partial |
CVSS Base score: 2.6 | CVSS Vector: (AV:N/AC:H/Au:N/C:N/I:N/A:P) |
Exploitability | Remediation Level | Report Confidence |
---|---|---|
Unproven that exploit exists | Unavailable | Confirmed |
CVSS Temporal score: 2.2 | CVSS Vector: (AV:N/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:U/RC:C) |
Collateral Damage Potential | Target Distribution |
---|---|
None | High [76-100%] |
CVSS Environmental score: 2.2 | CVSS Vector: (AV:N/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:U/RC:C/CDP:N/TD:H/CR:ND/IR:ND/AR:ND) |
