OpenSSL vulnerability [CVE-2015-1788]

Advisory ID CVE Number Date discovered Severity Advisory revision
STORM-2015-005 CVE-2015-1788 06/12/2015 low v1

Vulnerability details

This vulnerability could cause an infinite loop when handling malformed elliptic curve parameters.

Impacted products

ProductsSeverityDetail
Stormshield Network Security low The webadmin, authentication portal and SSL proxy can use elliptic curve in TLS negotiation.
Netasq low The webadmin, authentication portal and SSL proxy can use elliptic curve in TLS negotiation.

Revisions

Version Date Description
v1  05/17/2015 Initial release


Stormshield Network Security

CVSS v2 Overall Score: 3.9      

Analysis

Impacted version

During negotiation with authentication portal, webadmin or SSL proxy, malformed elliptic curve parameters can process an infinite loop. The daemons will be restarted with checkpoint event.

  • SNS v1.0 to v1.3.2
  • SNS v2.1

Workaround solution

Solution

There is no workaround solution.

The v1.3.3 and v2.1.1 will fix this vulnerability.



Access vector Access complexity Authentication Confidentiality impact Integrity impact Availability impact
Network Medium None None None Partial
CVSS Base score: 4.3 CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)
Exploitability Remediation Level Report Confidence
Proof of concept code Unavailable Confirmed
CVSS Temporal score: 3.9 CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:U/RC:C)
Collateral Damage Potential Target Distribution
None High [76-100%]
CVSS Environmental score: 3.9 CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:U/RC:C/CDP:N/TD:H/CR:ND/IR:ND/AR:ND)


Netasq

CVSS v2 Overall Score: 3.9      

Analysis

Impacted version

During negotiation with authentication portal, webadmin or SSL proxy, malformed elliptic curve parameters can process an infinite loop. The daemons will be restarted with checkpoint event.

  • Netasq v8.1.3 and above are impacted
  • Netasq v9.0.0 and above are impacted
  • Netasq v9.1.0 to v9.1.5.1 are impacted

Workaround solution

Solution

There is no workaround solution.

The v9.1.5.2 will fix this vulnerability.



Access vector Access complexity Authentication Confidentiality impact Integrity impact Availability impact
Network Medium None None None Partial
CVSS Base score: 4.3 CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)
Exploitability Remediation Level Report Confidence
Proof of concept code Unavailable Confirmed
CVSS Temporal score: 3.9 CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:U/RC:C)
Collateral Damage Potential Target Distribution
None High [76-100%]
CVSS Environmental score: 3.9 CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:U/RC:C/CDP:N/TD:H/CR:ND/IR:ND/AR:ND)