cpe:/a:openssl:openssl:1.0.2 CVE-2015-1787 2015-03-19T18:59:12.473-04:00 2017-10-19T21:29:05.737-04:00 2.6 NETWORK HIGH NONE NONE NONE PARTIAL http://nvd.nist.gov 2016-06-28T11:31:13.807-04:00 SECTRACK 1031929 BID 73238 GENTOO GLSA-201503-11 HP HPSBMU03380 HP HPSBMU03397 HP HPSBMU03409 CONFIRM http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html CONFIRM http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html CONFIRM http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html CONFIRM http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html CONFIRM http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html CONFIRM https://bto.bluecoat.com/security-advisory/sa92 CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=1202406 CONFIRM https://git.openssl.org/?p=openssl.git;a=commit;h=b19d8143212ae5fbc9cebfd51c01f802fabccd33 CONFIRM https://kc.mcafee.com/corporate/index?page=content&id=SB10110 CONFIRM https://www.openssl.org/news/secadv_20150319.txt The ssl3_get_client_key_exchange function in s3_srvr.c in OpenSSL 1.0.2 before 1.0.2a, when client authentication and an ephemeral Diffie-Hellman ciphersuite are enabled, allows remote attackers to cause a denial of service (daemon crash) via a ClientKeyExchange message with a length of zero.