CVE-2015-0205

Priority
Description
The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before
1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a
Diffie-Hellman (DH) certificate without requiring a CertificateVerify
message, which allows remote attackers to obtain access without knowledge
of a private key via crafted TLS Handshake Protocol traffic to a server
that recognizes a Certification Authority with DH support.
Assigned-to
mdeslaur
Notes
mdeslaurprecise isn't actually affected, as the code used to be wrong,
resulting in a no-op, and having the same result as this
security fix. See the following commit:
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=c2770c0e0e0da5f447227553c248f9a94504ee4e
Package
Upstream:released (1.0.1k)
Ubuntu 14.04 ESM (Trusty Tahr):released (1.0.1f-1ubuntu2.8)
Patches:
Upstream:https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=98a0f9660d374f58f79ee0efcc8c1672a805e8e8 (1.0.1)
Package
Upstream:not-affected
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected)
More Information

Updated: 2019-12-05 18:39:17 UTC (commit dd38ff22974aae499eb50644b9d5a2817483cbdb)