OpenSSL vulnerability [CVE-2015-1788]
| Advisory ID | CVE Number | Date discovered | Severity | Advisory revision |
|---|---|---|---|---|
| STORM-2015-005 | CVE-2015-1788 | 06/12/2015 | low | v1 |
Vulnerability details
This vulnerability could cause an infinite loop when handling malformed elliptic curve parameters.
Impacted products
| Products | Severity | Detail |
|---|---|---|
| Stormshield Network Security | low | The webadmin, authentication portal and SSL proxy can use elliptic curve in TLS negotiation. |
| Netasq | low | The webadmin, authentication portal and SSL proxy can use elliptic curve in TLS negotiation. |
Revisions
| Version | Date | Description |
|---|---|---|
| v1 | 05/17/2015 | Initial release |

Stormshield Network Security |
CVSS v2 Overall Score: 3.9
|
Analysis |
Impacted version |
|
During negotiation with authentication portal, webadmin or SSL proxy, malformed elliptic curve parameters can process an infinite loop. The daemons will be restarted with checkpoint event. |
|
Workaround solution |
Solution |
|
There is no workaround solution. |
The v1.3.3 and v2.1.1 will fix this vulnerability. |
| Access vector | Access complexity | Authentication | Confidentiality impact | Integrity impact | Availability impact |
|---|---|---|---|---|---|
| Network | Medium | None | None | None | Partial |
| CVSS Base score: 4.3 | CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P) |
| Exploitability | Remediation Level | Report Confidence |
|---|---|---|
| Proof of concept code | Unavailable | Confirmed |
| CVSS Temporal score: 3.9 | CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:U/RC:C) |
| Collateral Damage Potential | Target Distribution |
|---|---|
| None | High [76-100%] |
| CVSS Environmental score: 3.9 | CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:U/RC:C/CDP:N/TD:H/CR:ND/IR:ND/AR:ND) |

Netasq |
CVSS v2 Overall Score: 3.9
|
Analysis |
Impacted version |
|
During negotiation with authentication portal, webadmin or SSL proxy, malformed elliptic curve parameters can process an infinite loop. The daemons will be restarted with checkpoint event. |
|
Workaround solution |
Solution |
|
There is no workaround solution. |
The v9.1.5.2 will fix this vulnerability. |
| Access vector | Access complexity | Authentication | Confidentiality impact | Integrity impact | Availability impact |
|---|---|---|---|---|---|
| Network | Medium | None | None | None | Partial |
| CVSS Base score: 4.3 | CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P) |
| Exploitability | Remediation Level | Report Confidence |
|---|---|---|
| Proof of concept code | Unavailable | Confirmed |
| CVSS Temporal score: 3.9 | CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:U/RC:C) |
| Collateral Damage Potential | Target Distribution |
|---|---|
| None | High [76-100%] |
| CVSS Environmental score: 3.9 | CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:U/RC:C/CDP:N/TD:H/CR:ND/IR:ND/AR:ND) |

