René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

312 lines
10 KiB
JSON

{
"id": "CVE-2015-1793",
"sourceIdentifier": "secalert@redhat.com",
"published": "2015-07-09T19:17:00.093",
"lastModified": "2018-11-30T21:30:22.727",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certificate verifications via a valid leaf certificate."
},
{
"lang": "es",
"value": "La funci\u00f3n de verificaci\u00f3n de certificado X509 en crypto/x509/x509_vfy.c en OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, y 1.0.2c no procesa correctamente los valores cA de restricci\u00f3n b\u00e1sica del X.509 durante la identificaci\u00f3n de cadenas de certificado alternativo, lo que permite a atacantes remotos suplantar una funci\u00f3n de autoridad de certificaci\u00f3n y propiciar verificaciones de certificado involuntarias a trav\u00e9s de un leaf certificate v\u00e1lido."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 6.4
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-254"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:supply_chain_products_suite:6.1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F958CB89-F7D2-4773-86D9-4C225ED44128"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:supply_chain_products_suite:6.1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5BF690CE-E83D-4C92-A0F2-5A5A450F73F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:supply_chain_products_suite:6.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4C8E58-FD8C-4269-98B2-FAB85271C9C1"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3581A634-36D3-4EA1-A08F-973E216B6DAE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "41684398-18A4-4DC6-B8A2-3EBAA0CBF9A6"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*",
"matchCriteriaId": "A9EC827B-5313-47D7-BF49-CFF033CF3D53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*",
"matchCriteriaId": "A438E65F-33B1-46BC-AD93-200DCC6B43D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*",
"matchCriteriaId": "4847BCF3-EFCE-41AF-8E7D-3D51EB9DCC5B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*",
"matchCriteriaId": "9B89180B-FB68-4DD8-B076-16E51CC7FB91"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:oracle:opus_10g_ethernet_switch_family:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.0.0.6",
"matchCriteriaId": "D5646853-D852-45B8-8835-2C77C937FC9D"
}
]
}
]
}
],
"references": [
{
"url": "http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery",
"source": "secalert@redhat.com"
},
{
"url": "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc",
"source": "secalert@redhat.com"
},
{
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694",
"source": "secalert@redhat.com"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161747.html",
"source": "secalert@redhat.com"
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161782.html",
"source": "secalert@redhat.com"
},
{
"url": "http://marc.info/?l=bugtraq&m=143880121627664&w=2",
"source": "secalert@redhat.com"
},
{
"url": "http://marc.info/?l=bugtraq&m=144370846326989&w=2",
"source": "secalert@redhat.com"
},
{
"url": "http://openssl.org/news/secadv_20150709.txt",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150710-openssl",
"source": "secalert@redhat.com"
},
{
"url": "http://www.fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery",
"source": "secalert@redhat.com"
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"source": "secalert@redhat.com"
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"source": "secalert@redhat.com"
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"source": "secalert@redhat.com"
},
{
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html",
"source": "secalert@redhat.com"
},
{
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/75652",
"source": "secalert@redhat.com"
},
{
"url": "http://www.securityfocus.com/bid/91787",
"source": "secalert@redhat.com"
},
{
"url": "http://www.securitytracker.com/id/1032817",
"source": "secalert@redhat.com"
},
{
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.561427",
"source": "secalert@redhat.com"
},
{
"url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454058.htm",
"source": "secalert@redhat.com"
},
{
"url": "https://git.openssl.org/?p=openssl.git;a=commit;h=9a0db453ba017ebcaccbee933ee6511a9ae4d1c8",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04822825",
"source": "secalert@redhat.com"
},
{
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763",
"source": "secalert@redhat.com"
},
{
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351",
"source": "secalert@redhat.com"
},
{
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
"source": "secalert@redhat.com"
},
{
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10125",
"source": "secalert@redhat.com"
},
{
"url": "https://security.gentoo.org/glsa/201507-15",
"source": "secalert@redhat.com"
},
{
"url": "https://www.exploit-db.com/exploits/38640/",
"source": "secalert@redhat.com"
},
{
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-15:12.openssl.asc",
"source": "secalert@redhat.com"
}
]
}