CVE-2015-3193
Summary
| CVE | CVE-2015-3193 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2015-12-06 20:59:02 UTC |
| Updated | 2026-05-06 22:30:45 UTC |
| Description | The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite. |
Risk And Classification
Primary CVSS: v3.1 7.5 HIGH from [email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Problem Types: CWE-200 | n/a
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 7.5 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
| 2.0 | [email protected] | Primary | 5 | AV:N/AC:L/Au:N/C:P/I:N/A:N |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
NoneAvailability
NoneCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
NoneAvailability
NoneAV:N/AC:L/Au:N/C:P/I:N/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Canonical | Ubuntu Linux | 12.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 14.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 15.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 15.10 | All | All | All |
| Application | Nodejs | Node.js | All | All | All | All |
| Application | Nodejs | Node.js | All | All | All | All |
| Application | Nodejs | Node.js | All | All | All | All |
| Application | Openssl | Openssl | 1.0.2 | All | All | All |
| Application | Openssl | Openssl | 1.0.2a | All | All | All |
| Application | Openssl | Openssl | 1.0.2b | All | All | All |
| Application | Openssl | Openssl | 1.0.2c | All | All | All |
| Application | Openssl | Openssl | 1.0.2d | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 2016-10 Security Bulletin: CTPView: Multiple vulnerabilities in CTPView - Juniper Networks | af854a3a-2127-422b-91ae-364da2661108 | kb.juniper.net | Third Party Advisory |
| Fuzzing Math - miscalculations in OpenSSL's BN_mod_exp (CVE-2015-3193) | The Fuzzing Project | af854a3a-2127-422b-91ae-364da2661108 | blog.fuzzing-project.org | Third Party Advisory |
| Bug 1288317 – CVE-2015-3193 OpenSSL: BN_mod_exp may produce incorrect results on x86_64 | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.redhat.com | Issue Tracking, Third Party Advisory |
| USN-2830-1: OpenSSL vulnerabilities | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | Third Party Advisory |
| Malformed Request | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Multiple Vulnerabilities in OpenSSL (December 2015) Affecting Cisco Products | af854a3a-2127-422b-91ae-364da2661108 | tools.cisco.com | Third Party Advisory |
| openssl.org/news/secadv/20151203.txt | af854a3a-2127-422b-91ae-364da2661108 | openssl.org | Vendor Advisory |
| FortiGuard.com | OpenSSL Advisory - December 2015 | af854a3a-2127-422b-91ae-364da2661108 | www.fortiguard.com | Third Party Advisory |
| FortiGuard.com | OpenSSL Advisory - December 2015 | af854a3a-2127-422b-91ae-364da2661108 | fortiguard.com | Third Party Advisory |
| Oracle Critical Patch Update - July 2016 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Patch, Third Party Advisory |
| OpenSSL Multiple Bugs Let Remote Users Deny Service and Obtain Potentially Sensitive Information - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | Third Party Advisory, VDB Entry |
| The Slackware Linux Project: Slackware Security Advisories | af854a3a-2127-422b-91ae-364da2661108 | www.slackware.com | Third Party Advisory |
| Juniper Networks - 2016-10 Security Bulletin: OpenSSL security updates | af854a3a-2127-422b-91ae-364da2661108 | kb.juniper.net | Third Party Advisory |
| Public KB - SA40100 - [Pulse Secure] December 3rd 2015 OpenSSL Security Advisory | af854a3a-2127-422b-91ae-364da2661108 | kb.pulsesecure.net | Third Party Advisory |
| Oracle Critical Patch Update - October 2017 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Patch, Third Party Advisory |
| git.openssl.org Git - openssl.git/commit | af854a3a-2127-422b-91ae-364da2661108 | git.openssl.org | |
| Oracle Critical Patch Update Advisory - April 2016 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Patch, Third Party Advisory |
| cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf | af854a3a-2127-422b-91ae-364da2661108 | cert-portal.siemens.com | |
| Document Display | HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20566.www2.hpe.com | Third Party Advisory |
| 404 Page not found | af854a3a-2127-422b-91ae-364da2661108 | kb.isc.org | Third Party Advisory |
| Oracle July 2016 Critical Patch Update Multiple Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| The Slackware Linux Project: Slackware Security Advisories | af854a3a-2127-422b-91ae-364da2661108 | www.slackware.com | Third Party Advisory |
| git.openssl.org Git - openssl.git/commit | MITRE | git.openssl.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 591280 Siemens SCALANCE X-200RNA Switch Devices Denial of Service (DoS) Multiple Vulnerabilities (ICSA-22-349-21, SSA-412672)