The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3287-1 | openssl security update |
Ubuntu USN |
USN-2639-1 | OpenSSL vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T04:54:16.088Z
Reserved: 2015-02-17T00:00:00
Link: CVE-2015-1788
No data.
Status : Deferred
Published: 2015-06-12T19:59:01.600
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-1788
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN