Vulnerability Name: | CVE-2015-0208 (CCN-101667) |
Assigned: | 2014-11-18 |
Published: | 2015-03-19 |
Updated: | 2022-12-13 |
Summary: | |
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Low |
|
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P) 3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P) 3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial |
|
Vulnerability Consequences: | Denial of Service |
References: | Source: MITRE Type: CNA CVE-2015-0208
Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com
Source: CCN Type: IBM Security Bulletin N1020693 Security Bulletin: IBM i is affected by several OpenSSL vulnerabilities.
Source: CCN Type: IBM Security Bulletin S1005300 Vulnerabilities in OpenSSL affect IBM SAN b-type Switches
Source: CCN Type: IBM Security Bulletin S1005311 Vulnerabilities in OpenSSL affect IBM Cisco MDS Switches and Directors.
Source: CCN Type: IBM Security Bulletin S1005375 Multiple vulnerabilities impact DS8000 HMC
Source: CCN Type: IBM Security Bulletin S1009623 (Clustered Data ONTAP Antivirus Connector) Vulnerabilities in OpenSSL including ClientHello DoS affect Multiple N series Products
Source: CCN Type: IBM Security Bulletin 1701334 Vulnerabilities in OpenSSL affects Rational Application Developer for WebSphere Software
Source: CCN Type: IBM Security Bulletin 1713653 Vulnerabilities in OpenSSL affect Rational Tau (CVE-2015-0208, CVE-2015-0286, CVE-2015-0292)
Source: CCN Type: IBM Security Bulletin 1722409 Vulnerabilities in OpenSSL affect the Cordova platform packaged with Rational Application Developer affecting Rational Developer for i and Rational Developer for AIX and Linux
Source: CCN Type: IBM Security Bulletin 1882955 Vulnerabilities in OpenSSL affects Rational Software Architect for Websphere Software
Source: CCN Type: IBM Security Bulletin 1883249 Vulnerabilities in OpenSSL including ClientHello DoS affect IBM Sterling B2B Integrator (CVE-2015-0209, CVE-2015-0287, CVE-2015-0292, and others)
Source: CCN Type: IBM Security Bulletin 1902449 Vulnerabilities in OpenSSL affect IBM InfoSphere Guardium (CVE-2015-0208, CVE-2015-0209, CVE-2015-0286, CVE-2015-0288, CVE-2015-0289, CVE-2015-0292, CVE-2015-0293
Source: CCN Type: IBM Security Bulletin 1902724 Community Server 9 HF1 and version 9 Limited Use are affected by vulnerabilities in OpenSSL (CVE-2014-3569, CVE-2014-3570, CVE-2014-3572, CVE-2014-8275, CVE-2015-0204, CVE-2015-0205, CVE-2015-0208, CVE-2015-0209,CVE-2015-0285, CVE-2015
Source: CCN Type: IBM Security Bulletin 1963783 Multiple Security Issues in IBM Media Server Due to OpenSSL Issues
Source: CCN Type: IBM Security Bulletin 1964686 Vulnerabilities in OpenSSL affecting Sametime Unified Telephony
Source: CCN Type: IBM Security Bulletin 1966177 IBM Cognos TM1 is affected by multiple vulnerabilities
Source: secalert@redhat.com Type: Patch, Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com
Source: CCN Type: BID-73230 OpenSSL CVE-2015-0208 NULL Pointer Dereference Denial of Service Vulnerability
Source: secalert@redhat.com Type: Third Party Advisory, VDB Entry secalert@redhat.com
Source: secalert@redhat.com Type: Third Party Advisory, VDB Entry secalert@redhat.com
Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Issue Tracking, Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com
Source: XF Type: UNKNOWN openssl-cve20150208-dos(101667)
Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com
Source: CCN Type: OpenSSL Security Advisory [19 Mar 2015] OpenSSL Security Advisory
Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com
Source: CCN Type: WhiteSource Vulnerability Database CVE-2015-0208
|
Vulnerable Configuration: | Configuration CCN 1: cpe:/a:openssl:openssl:1.0.2:*:*:*:*:*:*:*AND cpe:/a:ibm:cognos_tm1:9.5.2:*:*:*:*:*:*:*OR cpe:/a:ibm:infosphere_guardium:8.2:*:*:*:*:*:*:*OR cpe:/a:ibm:infosphere_guardium:9.0:*:*:*:*:*:*:*OR cpe:/a:ibm:sterling_b2b_integrator:5.1:*:*:*:*:*:*:*OR cpe:/a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*OR cpe:/a:ibm:sametime:8.5.2:*:*:*:*:*:*:*OR cpe:/a:ibm:sametime:8.5.2.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_tm1:10.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:sametime:9.0:*:*:*:*:*:*:*OR cpe:/a:ibm:sametime:9.0.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_tm1:10.2.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_application_developer:9.1:*:*:*:websphere:*:*:*OR cpe:/a:ibm:rational_application_developer:9.1.0.1:*:*:*:websphere:*:*:*OR cpe:/a:ibm:rational_application_developer:9.1.1:*:*:*:websphere:*:*:*OR cpe:/o:ibm:i:6.1:*:*:*:*:*:*:*OR cpe:/o:ibm:i:7.1:*:*:*:*:*:*:*OR cpe:/o:ibm:i:7.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_software_architect:9.1:*:*:*:websphere:*:*:*OR cpe:/a:ibm:infosphere_guardium:9.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_tau:4.3:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_tau:4.3.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_tau:4.3.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_tau:4.3.0.3:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_tau:4.3.0.4:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_tau:4.3.0.5:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_tau:4.3.0.6:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_tm1:10.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_developer_for_i:9.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_software_architect:9.1.1:*:*:*:websphere:*:*:*OR cpe:/a:ibm:rational_developer_for_i:9.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_developer_for_i:9.1.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:clustered_data_ontap_antivirus_connector:1.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:clustered_data_ontap_antivirus_connector:1.0.2:*:*:*:*:*:*:* Denotes that component is vulnerable |
Oval Definitions |
|
BACK |
openssl openssl 1.0.2
ibm cognos tm1 9.5.2
ibm infosphere guardium 8.2
ibm infosphere guardium 9.0
ibm sterling b2b integrator 5.1
ibm sterling b2b integrator 5.2
ibm sametime 8.5.2
ibm sametime 8.5.2.1
ibm cognos tm1 10.1.1
ibm sametime 9.0
ibm sametime 9.0.0.1
ibm cognos tm1 10.2.2
ibm rational application developer 9.1
ibm rational application developer 9.1.0.1
ibm rational application developer 9.1.1
ibm i 6.1
ibm i 7.1
ibm i 7.2
ibm rational software architect 9.1
ibm infosphere guardium 9.1
ibm rational tau 4.3
ibm rational tau 4.3.0.1
ibm rational tau 4.3.0.2
ibm rational tau 4.3.0.3
ibm rational tau 4.3.0.4
ibm rational tau 4.3.0.5
ibm rational tau 4.3.0.6
ibm cognos tm1 10.2
ibm rational developer for i 9.1
ibm rational software architect 9.1.1
ibm rational developer for i 9.1.1
ibm rational developer for i 9.1.1.1
ibm clustered data ontap antivirus connector 1.0.1
ibm clustered data ontap antivirus connector 1.0.2