Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2015-1793


The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certificate verifications via a valid leaf certificate.


Published

2015-07-09T19:17:00.093

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv3.0: 6.5 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

4.9

Weaknesses
  • Type: Primary
    CWE-254

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application oracle supply_chain_products_suite 6.1.2.2 Yes
Application oracle supply_chain_products_suite 6.1.3.0 Yes
Application oracle supply_chain_products_suite 6.2.0 Yes
Application oracle jd_edwards_enterpriseone_tools 9.1 Yes
Application oracle jd_edwards_enterpriseone_tools 9.2 Yes
Application openssl openssl 1.0.1n Yes
Application openssl openssl 1.0.1o Yes
Application openssl openssl 1.0.2b Yes
Application openssl openssl 1.0.2c Yes
Operating System oracle opus_10g_ethernet_switch_family ≤ 2.0.0.6 Yes

References