CVE-2015-4000

low

Description

The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.

References

http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc

http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery

http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04876402

http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04949778

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10681

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727

http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html

http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html

http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159314.html

http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159351.html

http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160117.html

http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html

http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html

http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html

http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html

http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html

http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html

http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html

http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html

http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html

http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html

http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html

http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html

http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html

http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html

http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html

http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html

http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html

http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html

http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html

http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html

http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html

http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html

http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html

http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html

http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html

http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html

http://lists.opensuse.org/opensuse-updates/2015-07/msg00016.html

http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html

http://lists.opensuse.org/opensuse-updates/2016-02/msg00094.html

http://lists.opensuse.org/opensuse-updates/2016-02/msg00097.html

http://marc.info/?l=bugtraq&m=143506486712441&w=2

http://marc.info/?l=bugtraq&m=143557934009303&w=2

http://marc.info/?l=bugtraq&m=143558092609708&w=2

http://marc.info/?l=bugtraq&m=143628304012255&w=2

http://marc.info/?l=bugtraq&m=143637549705650&w=2

http://marc.info/?l=bugtraq&m=143655800220052&w=2

http://marc.info/?l=bugtraq&m=143880121627664&w=2

http://marc.info/?l=bugtraq&m=144043644216842&w=2

http://marc.info/?l=bugtraq&m=144050121701297&w=2

http://marc.info/?l=bugtraq&m=144060576831314&w=2

http://marc.info/?l=bugtraq&m=144060606031437&w=2

http://marc.info/?l=bugtraq&m=144061542602287&w=2

http://marc.info/?l=bugtraq&m=144069189622016&w=2

http://marc.info/?l=bugtraq&m=144102017024820&w=2

http://marc.info/?l=bugtraq&m=144104533800819&w=2

http://marc.info/?l=bugtraq&m=144493176821532&w=2

http://marc.info/?l=bugtraq&m=145409266329539&w=2

http://openwall.com/lists/oss-security/2015/05/20/8

http://rhn.redhat.com/errata/RHSA-2015-1072.html

http://rhn.redhat.com/errata/RHSA-2015-1185.html

http://rhn.redhat.com/errata/RHSA-2015-1197.html

http://rhn.redhat.com/errata/RHSA-2015-1228.html

http://rhn.redhat.com/errata/RHSA-2015-1229.html

http://rhn.redhat.com/errata/RHSA-2015-1230.html

http://rhn.redhat.com/errata/RHSA-2015-1241.html

http://rhn.redhat.com/errata/RHSA-2015-1242.html

http://rhn.redhat.com/errata/RHSA-2015-1243.html

http://rhn.redhat.com/errata/RHSA-2015-1485.html

http://rhn.redhat.com/errata/RHSA-2015-1486.html

http://rhn.redhat.com/errata/RHSA-2015-1488.html

http://rhn.redhat.com/errata/RHSA-2015-1526.html

http://rhn.redhat.com/errata/RHSA-2015-1544.html

http://rhn.redhat.com/errata/RHSA-2015-1604.html

http://rhn.redhat.com/errata/RHSA-2016-1624.html

http://rhn.redhat.com/errata/RHSA-2016-2056.html

https://bugzilla.mozilla.org/show_bug.cgi?id=1138554

https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf

https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.1_release_notes

https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04718196

https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140

https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190

https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119

https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241

https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246

https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04918839

https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923929

https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04740527

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04953655

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128722

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193083

https://kc.mcafee.com/corporate/index?page=content&id=SB10122

https://openssl.org/news/secadv/20150611.txt

https://security.gentoo.org/glsa/201506-02

https://security.gentoo.org/glsa/201512-10

https://security.gentoo.org/glsa/201603-11

https://security.gentoo.org/glsa/201701-46

https://security.netapp.com/advisory/ntap-20150619-0001/

https://support.citrix.com/article/CTX216642

https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03831en_us

http://support.apple.com/kb/HT204941

http://support.apple.com/kb/HT204942

http://support.citrix.com/article/CTX201114

https://www-304.ibm.com/support/docview.wss?uid=swg21959745

https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098403

https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/

https://www.openssl.org/news/secadv_20150611.txt

https://www.oracle.com/security-alerts/cpujan2021.html

https://www.suse.com/security/cve/CVE-2015-4000.html

http://www-01.ibm.com/support/docview.wss?uid=swg21959111

http://www-01.ibm.com/support/docview.wss?uid=swg21959195

http://www-01.ibm.com/support/docview.wss?uid=swg21959325

http://www-01.ibm.com/support/docview.wss?uid=swg21959453

http://www-01.ibm.com/support/docview.wss?uid=swg21959481

http://www-01.ibm.com/support/docview.wss?uid=swg21959517

http://www-01.ibm.com/support/docview.wss?uid=swg21959530

http://www-01.ibm.com/support/docview.wss?uid=swg21959539

http://www-01.ibm.com/support/docview.wss?uid=swg21959636

http://www-01.ibm.com/support/docview.wss?uid=swg21959812

http://www-01.ibm.com/support/docview.wss?uid=swg21960191

http://www-01.ibm.com/support/docview.wss?uid=swg21961717

http://www-01.ibm.com/support/docview.wss?uid=swg21962455

http://www-01.ibm.com/support/docview.wss?uid=swg21962739

http://www-304.ibm.com/support/docview.wss?uid=swg21958984

http://www-304.ibm.com/support/docview.wss?uid=swg21959132

http://www-304.ibm.com/support/docview.wss?uid=swg21960041

http://www-304.ibm.com/support/docview.wss?uid=swg21960194

http://www-304.ibm.com/support/docview.wss?uid=swg21960380

http://www-304.ibm.com/support/docview.wss?uid=swg21960418

http://www-304.ibm.com/support/docview.wss?uid=swg21962816

http://www-304.ibm.com/support/docview.wss?uid=swg21967893

http://www.debian.org/security/2015/dsa-3287

http://www.debian.org/security/2015/dsa-3300

http://www.debian.org/security/2015/dsa-3316

http://www.debian.org/security/2015/dsa-3324

http://www.debian.org/security/2015/dsa-3339

http://www.debian.org/security/2016/dsa-3688

http://www.fortiguard.com/advisory/2015-05-20-logjam-attack

http://www.mozilla.org/security/announce/2015/mfsa2015-70.html

http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html

http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html

http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html

http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html

http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html

http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html

http://www.securitytracker.com/id/1032474

http://www.securitytracker.com/id/1032475

http://www.securitytracker.com/id/1032476

http://www.securitytracker.com/id/1032637

http://www.securitytracker.com/id/1032645

http://www.securitytracker.com/id/1032647

http://www.securitytracker.com/id/1032648

http://www.securitytracker.com/id/1032649

http://www.securitytracker.com/id/1032650

http://www.securitytracker.com/id/1032651

http://www.securitytracker.com/id/1032652

http://www.securitytracker.com/id/1032653

http://www.securitytracker.com/id/1032654

http://www.securitytracker.com/id/1032655

http://www.securitytracker.com/id/1032656

http://www.securitytracker.com/id/1032688

http://www.securitytracker.com/id/1032699

http://www.securitytracker.com/id/1032702

http://www.securitytracker.com/id/1032727

http://www.securitytracker.com/id/1032759

http://www.securitytracker.com/id/1032777

http://www.securitytracker.com/id/1032778

http://www.securitytracker.com/id/1032783

http://www.securitytracker.com/id/1032784

http://www.securitytracker.com/id/1032856

http://www.securitytracker.com/id/1032864

http://www.securitytracker.com/id/1032865

http://www.securitytracker.com/id/1032871

http://www.securitytracker.com/id/1032884

http://www.securitytracker.com/id/1032910

http://www.securitytracker.com/id/1032932

http://www.securitytracker.com/id/1032960

http://www.securitytracker.com/id/1033019

http://www.securitytracker.com/id/1033064

http://www.securitytracker.com/id/1033065

http://www.securitytracker.com/id/1033067

http://www.securitytracker.com/id/1033208

http://www.securitytracker.com/id/1033209

http://www.securitytracker.com/id/1033210

http://www.securitytracker.com/id/1033222

http://www.securitytracker.com/id/1033341

http://www.securitytracker.com/id/1033385

http://www.securitytracker.com/id/1033416

http://www.securitytracker.com/id/1033430

http://www.securitytracker.com/id/1033433

http://www.securitytracker.com/id/1033513

http://www.securitytracker.com/id/1033760

http://www.securitytracker.com/id/1033891

http://www.securitytracker.com/id/1033991

http://www.securitytracker.com/id/1034087

http://www.securitytracker.com/id/1034728

http://www.securitytracker.com/id/1034884

http://www.securitytracker.com/id/1036218

http://www.securitytracker.com/id/1040630

http://www.ubuntu.com/usn/USN-2656-1

http://www.ubuntu.com/usn/USN-2656-2

http://www.ubuntu.com/usn/USN-2673-1

http://www.ubuntu.com/usn/USN-2696-1

http://www.ubuntu.com/usn/USN-2706-1

Details

Source: Mitre, NVD

Published: 2015-05-21

Risk Information

CVSS v2

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 3.7

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Severity: Low