CVE-2015-3216 in OpenSSL
Summary
Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.
Reservation
04/10/2015
Disclosure
07/07/2015
Entries
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnerability | CWE | Exp | Cou | CVE |
|---|---|---|---|---|---|
| 75951 | OpenSSL Lock Mechanism ssleay_rand_bytes race condition | 362 | Unproven | Official fix | CVE-2015-3216 |