ID

VAR-201503-0091


CVE

CVE-2015-1067


TITLE

SSL/TLS implementations accept export-grade RSA keys (FREAK attack)

Trust: 0.8

sources: CERT/CC: VU#243585

DESCRIPTION

Secure Transport in Apple iOS before 8.2, Apple OS X through 10.10.2, and Apple TV before 7.1 does not properly restrict TLS state transitions, which makes it easier for remote attackers to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the "FREAK" issue, a different vulnerability than CVE-2015-0204 and CVE-2015-1637. This case "FREAK" Vulnerability related to the problem. This vulnerability CVE-2015-0204 and CVE-2015-1637 Is a different vulnerability.Skillfully crafted by a third party TLS Through traffic EXPORT_RSA A cipher suite downgrade attack may be performed on the cipher. SSL/TLS Some implementations of export grade without intentional setting (512 Below bit ) of RSA Something accepts the key. Man-in-the-middle attacks against such software (man-in-the-middle attack) Is performed, the key used for encryption is decrypted, SSL/TLS The traffic content may be decrypted. this is" FREAK It is also called “attack”. Algorithm downgrade (CWE-757) CWE-757: Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') https://cwe.mitre.org/data/definitions/757.html Incorrect cipher strength (CWE-326) CWE-326: Inadequate Encryption Strength https://cwe.mitre.org/data/definitions/326.html SSL/TLS Some implementations of export grade without intentional setting (512 Below bit ) of RSA Something accepts the key. If a man-in-the-middle attack is performed on such software, it is guided to use a weak key in the negotiation at the start of communication, and as a result, encrypted information may be decrypted. The discoverer has released detailed information about this matter. FREAK: Factoring RSA Export Keys https://www.smacktls.com/#freakMan-in-the-middle attacks (man-in-the-middle attack) By SSL/TLS The contents of the communication may be decrypted. Apple iOS, Mac Os X, and TV are prone to a security-bypass vulnerability. Successfully exploiting these issues may allow attackers to perform unauthorized actions by conducting a man-in-the-middle attack. This may lead to other attacks. in the United States. A security vulnerability exists in the Secure Transport of several Apple products. The vulnerability is caused by the program not properly restricting the transition of TLS state. The following products and versions are affected: Apple iOS versions prior to 8.2, Apple OS X versions prior to 10.10.2, and Apple TV versions prior to 7.1. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2015-05-19-1 Watch OS 1.0.1 Watch OS 1.0.1 is now available and addresses the following: Certificate Trust Policy Available for: Apple Watch Sport, Apple Watch, and Apple Watch Edition Impact: Update to the certificate trust policy Description: The certificate trust policy was updated. The complete list of certificates may be viewed at https://support.apple.com/kb/204873 FontParser Available for: Apple Watch Sport, Apple Watch, and Apple Watch Edition Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved bounds checking. CVE-ID CVE-2015-1093 : Marc Schoenefeld Foundation Available for: Apple Watch Sport, Apple Watch, and Apple Watch Edition Impact: An application using NSXMLParser may be misused to disclose information Description: An XML External Entity issue existed in NSXMLParser's handling of XML. This issue was addressed by not loading external entities across origins. CVE-ID CVE-2015-1092 : Ikuya Fukumoto IOHIDFamily Available for: Apple Watch Sport, Apple Watch, and Apple Watch Edition Impact: A malicious application may be able to determine kernel memory layout Description: An issue existed in IOHIDFamily that led to the disclosure of kernel memory content. This issue was addressed through improved bounds checking. CVE-ID CVE-2015-1096 : Ilja van Sprundel of IOActive IOAcceleratorFamily Available for: Apple Watch Sport, Apple Watch, and Apple Watch Edition Impact: A malicious application may be able to determine kernel memory layout Description: An issue existed in IOAcceleratorFamily that led to the disclosure of kernel memory content. This issue was addressed by removing unneeded code. CVE-ID CVE-2015-1094 : Cererdlong of Alibaba Mobile Security Team Kernel Available for: Apple Watch Sport, Apple Watch, and Apple Watch Edition Impact: A malicious application may be able to cause a system denial of service Description: A race condition existed in the kernel's setreuid system call. This issue was addressed through improved state management. CVE-ID CVE-2015-1099 : Mark Mentovai of Google Inc. Kernel Available for: Apple Watch Sport, Apple Watch, and Apple Watch Edition Impact: An attacker with a privileged network position may be able to redirect user traffic to arbitrary hosts Description: ICMP redirects were enabled by default. This issue was addressed by disabling ICMP redirects. CVE-ID CVE-2015-1103 : Zimperium Mobile Security Labs Kernel Available for: Apple Watch Sport, Apple Watch, and Apple Watch Edition Impact: A remote attacker may be able to cause a denial of service Description: A state inconsistency issue existed in the handling of TCP out of band data. This issue was addressed through improved state management. CVE-ID CVE-2015-1105 : Kenton Varda of Sandstorm.io Kernel Available for: Apple Watch Sport, Apple Watch, and Apple Watch Edition Impact: A malicious application may escalate privileges using a compromised service intended to run with reduced privileges Description: setreuid and setregid system calls failed to drop privileges permanently. This issue was addressed by correctly dropping privileges. CVE-ID CVE-2015-1117 : Mark Mentovai of Google Inc. Kernel Available for: Apple Watch Sport, Apple Watch, and Apple Watch Edition Impact: A remote attacker may be able to bypass network filters Description: The system would treat some IPv6 packets from remote network interfaces as local packets. The issue was addressed by rejecting these packets. CVE-ID CVE-2015-1104 : Stephen Roettger of the Google Security Team Kernel Available for: Apple Watch Sport, Apple Watch, and Apple Watch Edition Impact: An attacker with a privileged network position may be able to cause a denial of service Description: A state inconsistency existed in the processing of TCP headers. This issue was addressed through improved state handling. CVE-ID CVE-2015-1102 : Andrey Khudyakov and Maxim Zhuravlev of Kaspersky Lab Kernel Available for: Apple Watch Sport, Apple Watch, and Apple Watch Edition Impact: A malicious application may be able to cause unexpected system termination or read kernel memory Description: An out of bounds memory access issue existed in the kernel. This issue was addressed through improved memory handling. CVE-ID CVE-2015-1100 : Maxime Villard of m00nbsd Kernel Available for: Apple Watch Sport, Apple Watch, and Apple Watch Edition Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in the kernel. This issue was addressed through improved memory handling. CVE-ID CVE-2015-1101 : lokihardt@ASRT working with HP's Zero Day Initiative Secure Transport Available for: Apple Watch Sport, Apple Watch, and Apple Watch Edition Impact: An attacker with a privileged network position may intercept SSL/TLS connections Description: Secure Transport accepted short ephemeral RSA keys, usually used only in export-strength RSA cipher suites, on connections using full-strength RSA cipher suites. This issue, also known as FREAK, only affected connections to servers which support export-strength RSA cipher suites, and was addressed by removing support for ephemeral RSA keys. CVE-ID CVE-2015-1067 : Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Alfredo Pironti, and Jean Karim Zinzindohoue of Prosecco at Inria Paris Installation note: Instructions on how to update your Apple Watch software are available at https://support.apple.com/en-us/HT204641 To check the version on your Apple Watch, open the Apple Watch app on your iPhone and select "My Watch > General > About". Alternatively, on your watch, select "My Watch > General > About". Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJVW38oAAoJEBcWfLTuOo7tXpIP/3v/tqCIVXg28xQpAK2vRVtw S3clbM17RBsJ1b239DmGUdRNNCVimQCHk1dQ4M3szrXx73VjWroh1hSq2+hObL65 FGa4jYbns7OGbTr9YZW/fScJ9mnAuG1nDHcNLL8W2DyFuxNEJsCB668QPdTTMOoO Xpx8jZUZyXIyX2V3Ch1qasXsSV0IwSA5GPg5IFFFuaNXGC62AXx49UmFTtjBCs4w bvTRPKKBowuP80zmIaxlWpGXhTIe8TwjCDGSejk5kdddcqjXe1yzA1UPM+uBTHZK 7xOX55CctqT2LkO4ND6EWaaPUozDJtEoUf+pFjnJmZxNd6BHPx86KbkUw3lcBXso xZplhgaFlaA4UTxMLFJONId0DYtyXH7CLOYW9BKjyzMMo0YZHdt/2CQ1HQKfzQ9m bT+MT/wdFcgCjr90GLG9OFLCwf5h8bAHRtpvhWrV78ek6V92GuwjZUA8x18avNQO 1th8l49j+JN+OcVv0bvmxVSQpFurTfVRAxZ9lTq4VDdqZanwbvP6INOB8wxhKNbK 8phc4Amh8TwFf2esdmMWawWWAqxXL1+2D+MWxR+C8Hm4CWyxYvKhvHacM20IDTfF 6exVyn4D9FhnT16ggkF6qH9vOOrQk3msHmxdC3fdE4dRhR8W7xRbuNEMXn3CyP6f ssKTqTcaARrUZzOjyx2Z =HMct -----END PGP SIGNATURE----- . CVE-ID CVE-2015-1063 : Roman Digerberg, Sweden iCloud Keychain Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An attacker with a privileged network position may be able to execute arbitrary code Description: Multiple buffer overflows existed in the handling of data during iCloud Keychain recovery. CVE-ID CVE-2015-1061 : Ian Beer of Google Project Zero MobileStorageMounter Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may be able to create folders in trusted locations in the file system Description: An issue existed in the developer disk mounting logic which resulted in invalid disk image folders not being deleted. CVE-ID CVE-2015-1067 : Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Alfredo Pironti, and Jean Karim Zinzindohoue of Prosecco at Inria Paris Springboard Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A person with physical access to the device may be able to see the home screen of the device even if the device is not activated Description: An unexpected application termination during activation could have caused the device to show the home screen. CVE-ID CVE-2015-1064 Installation note: This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "8.2". CVE-ID CVE-2015-1061 : Ian Beer of Google Project Zero Kernel Available for: OS X Yosemite v10.10.2 Impact: Maliciously crafted or compromised applications may be able to determine addresses in the kernel Description: The mach_port_kobject kernel interface leaked kernel addresses and heap permutation value, which may aid in bypassing address space layout randomization protection

Trust: 3.78

sources: NVD: CVE-2015-1067 // CERT/CC: VU#243585 // JVNDB: JVNDB-2015-001770 // JVNDB: JVNDB-2015-001672 // BID: 73009 // VULHUB: VHN-79027 // PACKETSTORM: 130742 // PACKETSTORM: 131932 // PACKETSTORM: 130741 // PACKETSTORM: 130743

AFFECTED PRODUCTS

vendor:necmodel:capssuitescope:eqversion:v4 to v5.1

Trust: 1.6

vendor:necmodel:csviewscope:eqversion:/faq navigator

Trust: 1.6

vendor:necmodel:csviewscope:eqversion:/web questionnaire

Trust: 1.6

vendor:necmodel:enterprisedirectoryserverscope:eqversion:ver6.0 to ver8.0

Trust: 1.6

vendor:necmodel:enterpriseidentitymanagerscope:eqversion: -

Trust: 1.6

vendor:necmodel:express5800scope:eqversion:/sg series intersecvm/sg v1.2

Trust: 1.6

vendor:necmodel:express5800scope:eqversion:v3.0

Trust: 1.6

vendor:necmodel:express5800scope:eqversion:v3.1

Trust: 1.6

vendor:necmodel:express5800scope:eqversion:v4.0

Trust: 1.6

vendor:necmodel:express5800scope:eqversion:/sg series sg3600lm/lg/lj v6.1

Trust: 1.6

vendor:necmodel:express5800scope:eqversion:v6.2

Trust: 1.6

vendor:necmodel:express5800scope:eqversion:v7.0

Trust: 1.6

vendor:necmodel:express5800scope:eqversion:v7.1

Trust: 1.6

vendor:necmodel:express5800scope:eqversion:v8.0

Trust: 1.6

vendor:necmodel:express5800scope:eqversion:/sg series univerge sg3000lg/lj

Trust: 1.6

vendor:necmodel:infocagescope:eqversion:security risk management v1.0.2 to v2.1.4

Trust: 1.6

vendor:necmodel:istoragescope:eqversion:a series

Trust: 1.6

vendor:necmodel:istoragescope:eqversion:d series

Trust: 1.6

vendor:necmodel:istoragescope:eqversion:e series

Trust: 1.6

vendor:necmodel:istoragescope:eqversion:hs series

Trust: 1.6

vendor:necmodel:istoragescope:eqversion:m series (nas including options )

Trust: 1.6

vendor:necmodel:istoragescope:eqversion:s series

Trust: 1.6

vendor:necmodel:secureware/pki application development kitscope:eqversion:ver3.0

Trust: 1.6

vendor:necmodel:secureware/pki application development kitscope:eqversion:ver3.01

Trust: 1.6

vendor:necmodel:secureware/pki application development kitscope:eqversion:ver3.02

Trust: 1.6

vendor:necmodel:secureware/pki application development kitscope:eqversion:ver3.1

Trust: 1.6

vendor:necmodel:webotxscope:eqversion:enterprise edition v4.2 to v6.5

Trust: 1.6

vendor:necmodel:webotxscope:eqversion:standard edition v4.2 to v6.5

Trust: 1.6

vendor:necmodel:webotxscope:eqversion:standard-j edition v4.1 to v6.5

Trust: 1.6

vendor:necmodel:webotxscope:eqversion:uddi registry v1.1 to v7.1

Trust: 1.6

vendor:necmodel:webotxscope:eqversion:web edition v4.1 to v6.5

Trust: 1.6

vendor:necmodel:webotx application serverscope:eqversion:enterprise edition v7.1

Trust: 1.6

vendor:necmodel:webotx application serverscope:eqversion:enterprise v8.2 to v9.2

Trust: 1.6

vendor:necmodel:webotx application serverscope:eqversion:express v8.2 to v9.2

Trust: 1.6

vendor:necmodel:webotx application serverscope:eqversion:foundation v8.2 to v8.5

Trust: 1.6

vendor:necmodel:webotx application serverscope:eqversion:standard edition v7.1

Trust: 1.6

vendor:necmodel:webotx application serverscope:eqversion:standard v8.2 to v9.2

Trust: 1.6

vendor:necmodel:webotx application serverscope:eqversion:standard-j edition v7.1 to v8.1

Trust: 1.6

vendor:necmodel:webotx application serverscope:eqversion:web edition v7.1 to v8.1

Trust: 1.6

vendor:necmodel:webotx enterprise service busscope:eqversion:v6.4 to v9.2

Trust: 1.6

vendor:necmodel:webotx portalscope:eqversion:v8.2 to v9.1

Trust: 1.6

vendor:necmodel:webotx sip application serverscope:eqversion:standard edition v7.1 to v8.1

Trust: 1.6

vendor:necmodel:websamscope:eqversion:application navigator v3.1.0.x to v4.1.0.x

Trust: 1.6

vendor:necmodel:websamscope:eqversion:jobcenter cl/web r13.1

Trust: 1.6

vendor:necmodel:websamscope:eqversion:jobcenter cl/web r13.2

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.10.2

Trust: 1.4

vendor:applemodel:iphone osscope:lteversion:8.1.3

Trust: 1.0

vendor:applemodel:tvosscope:lteversion:7.0.3

Trust: 1.0

vendor:applemodel:mac os xscope:lteversion:10.10.2

Trust: 1.0

vendor:applemodel: - scope: - version: -

Trust: 0.8

vendor:googlemodel: - scope: - version: -

Trust: 0.8

vendor:microsoftmodel: - scope: - version: -

Trust: 0.8

vendor:necmodel: - scope: - version: -

Trust: 0.8

vendor:opensslmodel: - scope: - version: -

Trust: 0.8

vendor:operamodel: - scope: - version: -

Trust: 0.8

vendor:research in motion rimmodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.8.5

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.9.5

Trust: 0.8

vendor:applemodel:tvscope:ltversion:7.1 (apple tv first 3 after generation )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:8.2 (ipad 2 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:8.2 (iphone 4s or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:8.2 (ipod touch first 5 after generation )

Trust: 0.8

vendor:applemodel:watchosscope:ltversion:1.0.1 (apple watch edition)

Trust: 0.8

vendor:applemodel:watchosscope:ltversion:1.0.1 (apple watch sport)

Trust: 0.8

vendor:applemodel:watchosscope:ltversion:1.0.1 (apple watch)

Trust: 0.8

vendor:applemodel:iphone osscope:eqversion:8.1.3

Trust: 0.6

vendor:applemodel:tvscope:eqversion:7.0.3

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:ios betascope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.4

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:1.0

Trust: 0.3

sources: CERT/CC: VU#243585 // BID: 73009 // JVNDB: JVNDB-2015-001770 // JVNDB: JVNDB-2015-001672 // CNNVD: CNNVD-201503-235 // NVD: CVE-2015-1067

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-1067
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-1067
value: MEDIUM

Trust: 0.8

IPA: JVNDB-2015-001672
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201503-235
value: MEDIUM

Trust: 0.6

VULHUB: VHN-79027
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-1067
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2015-1067
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

IPA: JVNDB-2015-001672
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-79027
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-79027 // JVNDB: JVNDB-2015-001770 // JVNDB: JVNDB-2015-001672 // CNNVD: CNNVD-201503-235 // NVD: CVE-2015-1067

PROBLEMTYPE DATA

problemtype:CWE-310

Trust: 1.9

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-79027 // JVNDB: JVNDB-2015-001770 // JVNDB: JVNDB-2015-001672 // NVD: CVE-2015-1067

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201503-235

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201503-235

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-001770

PATCH

title:アライドテレシス株式会社からの情報url:http://jvn.jp/vu/JVNVU99125992/522154/index.html

Trust: 1.6

title:NV15-016url:http://jpn.nec.com/security-info/secinfo/nv15-016.html

Trust: 1.6

title:APPLE-SA-2015-03-09-1 iOS 8.2url:http://lists.apple.com/archives/security-announce/2015/Mar/msg00000.html

Trust: 0.8

title:APPLE-SA-2015-03-09-2 AppleTV 7.1url:http://lists.apple.com/archives/security-announce/2015/Mar/msg00001.html

Trust: 0.8

title:APPLE-SA-2015-03-09-3 Security Update 2015-002url:http://lists.apple.com/archives/security-announce/2015/Mar/msg00002.html

Trust: 0.8

title:APPLE-SA-2015-04-08-2 OS X 10.10.3 and Security Update 2015-004url:http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html

Trust: 0.8

title:APPLE-SA-2015-05-19-1 Watch OS 1.0.1url:http://lists.apple.com/archives/security-announce/2015/May/msg00001.html

Trust: 0.8

title:HT204423url:http://support.apple.com/en-us/HT204423

Trust: 0.8

title:HT204413url:http://support.apple.com/en-us/HT204413

Trust: 0.8

title:HT204659url:https://support.apple.com/en-us/HT204659

Trust: 0.8

title:HT204426url:http://support.apple.com/en-us/HT204426

Trust: 0.8

title:HT204870url:https://support.apple.com/en-us/HT204870

Trust: 0.8

title:HT204870url:https://support.apple.com/ja-jp/HT204870

Trust: 0.8

title:HT204659url:https://support.apple.com/ja-jp/HT204659

Trust: 0.8

title:HT204423url:http://support.apple.com/ja-jp/HT204423

Trust: 0.8

title:HT204413url:http://support.apple.com/ja-jp/HT204413

Trust: 0.8

title:HT204426url:http://support.apple.com/ja-jp/HT204426

Trust: 0.8

title:[08 Jan 2015]url:https://www.openssl.org/news/secadv_20150108.txt

Trust: 0.8

title:3046015url:https://technet.microsoft.com/ja-jp/library/security/3046015

Trust: 0.8

title:iPhone7,1_8.2_12D508_Restoreurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54079

Trust: 0.6

sources: JVNDB: JVNDB-2015-001770 // JVNDB: JVNDB-2015-001672 // CNNVD: CNNVD-201503-235

EXTERNAL IDS

db:NVDid:CVE-2015-1067

Trust: 3.2

db:CERT/CCid:VU#243585

Trust: 2.4

db:BIDid:73009

Trust: 2.0

db:SECTRACKid:1031830

Trust: 1.7

db:SECTRACKid:1031829

Trust: 1.7

db:JVNid:JVNVU99125992

Trust: 1.6

db:JVNid:JVNVU93832567

Trust: 0.8

db:JVNid:JVNVU90171154

Trust: 0.8

db:JVNDBid:JVNDB-2015-001770

Trust: 0.8

db:JVNDBid:JVNDB-2015-001672

Trust: 0.8

db:CNNVDid:CNNVD-201503-235

Trust: 0.7

db:PACKETSTORMid:131932

Trust: 0.2

db:VULHUBid:VHN-79027

Trust: 0.1

db:PACKETSTORMid:130742

Trust: 0.1

db:PACKETSTORMid:130741

Trust: 0.1

db:PACKETSTORMid:130743

Trust: 0.1

sources: CERT/CC: VU#243585 // VULHUB: VHN-79027 // BID: 73009 // JVNDB: JVNDB-2015-001770 // JVNDB: JVNDB-2015-001672 // PACKETSTORM: 130742 // PACKETSTORM: 131932 // PACKETSTORM: 130741 // PACKETSTORM: 130743 // CNNVD: CNNVD-201503-235 // NVD: CVE-2015-1067

REFERENCES

url:https://freakattack.com/

Trust: 2.5

url:http://lists.apple.com/archives/security-announce/2015/mar/msg00000.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2015/mar/msg00001.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2015/mar/msg00002.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2015/apr/msg00001.html

Trust: 1.7

url:http://www.securityfocus.com/bid/73009

Trust: 1.7

url:https://support.apple.com/ht204413

Trust: 1.7

url:https://support.apple.com/ht204423

Trust: 1.7

url:https://support.apple.com/ht204426

Trust: 1.7

url:https://support.apple.com/ht204659

Trust: 1.7

url:https://support.apple.com/kb/ht204870

Trust: 1.7

url:http://www.securitytracker.com/id/1031829

Trust: 1.7

url:http://www.securitytracker.com/id/1031830

Trust: 1.7

url:https://www.smacktls.com/#freak

Trust: 1.6

url:http://jvn.jp/vu/jvnvu99125992/index.html

Trust: 1.6

url:https://www.kb.cert.org/vuls/id/243585

Trust: 1.6

url:http://blog.cryptographyengineering.com/2015/03/attack-of-week-freak-or-factoring-nsa.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/757.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/326.html

Trust: 0.8

url:https://tools.ietf.org/html/rfc4346#appendix-f.1.1.2

Trust: 0.8

url:https://technet.microsoft.com/library/security/3046015.aspx

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1067

Trust: 0.8

url:http://jvn.jp/vu/jvnvu90171154/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu93832567/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1067

Trust: 0.8

url:https://www.apple.com/support/security/pgp/

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-1067

Trust: 0.4

url:http://gpgtools.org

Trust: 0.4

url:http://www.apple.com/ios/

Trust: 0.3

url:http://www.apple.com/appletv/features.html

Trust: 0.3

url:http://www.apple.com/ipad/

Trust: 0.3

url:http://www.apple.com/iphone/

Trust: 0.3

url:http://www.apple.com/ipodtouch/

Trust: 0.3

url:http://www.apple.com/macosx/

Trust: 0.3

url:https://support.apple.com/kb/ht1222

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-1061

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-1062

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-1065

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-1104

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1093

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1099

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1101

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1096

Trust: 0.1

url:https://support.apple.com/kb/204873

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1102

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1105

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1103

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1092

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1100

Trust: 0.1

url:https://support.apple.com/en-us/ht204641

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1117

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1094

Trust: 0.1

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1064

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1063

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1066

Trust: 0.1

url:http://www.apple.com/support/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4496

Trust: 0.1

sources: CERT/CC: VU#243585 // VULHUB: VHN-79027 // BID: 73009 // JVNDB: JVNDB-2015-001770 // JVNDB: JVNDB-2015-001672 // PACKETSTORM: 130742 // PACKETSTORM: 131932 // PACKETSTORM: 130741 // PACKETSTORM: 130743 // CNNVD: CNNVD-201503-235 // NVD: CVE-2015-1067

CREDITS

Apple

Trust: 0.4

sources: PACKETSTORM: 130742 // PACKETSTORM: 131932 // PACKETSTORM: 130741 // PACKETSTORM: 130743

SOURCES

db:CERT/CCid:VU#243585
db:VULHUBid:VHN-79027
db:BIDid:73009
db:JVNDBid:JVNDB-2015-001770
db:JVNDBid:JVNDB-2015-001672
db:PACKETSTORMid:130742
db:PACKETSTORMid:131932
db:PACKETSTORMid:130741
db:PACKETSTORMid:130743
db:CNNVDid:CNNVD-201503-235
db:NVDid:CVE-2015-1067

LAST UPDATE DATE

2025-04-13T20:27:43.155000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#243585date:2015-10-27T00:00:00
db:VULHUBid:VHN-79027date:2019-03-08T00:00:00
db:BIDid:73009date:2015-07-15T00:04:00
db:JVNDBid:JVNDB-2015-001770date:2017-03-09T00:00:00
db:JVNDBid:JVNDB-2015-001672date:2017-03-09T00:00:00
db:CNNVDid:CNNVD-201503-235date:2019-03-13T00:00:00
db:NVDid:CVE-2015-1067date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CERT/CCid:VU#243585date:2015-03-06T00:00:00
db:VULHUBid:VHN-79027date:2015-03-11T00:00:00
db:BIDid:73009date:2015-03-09T00:00:00
db:JVNDBid:JVNDB-2015-001770date:2015-03-12T00:00:00
db:JVNDBid:JVNDB-2015-001672date:2015-03-10T00:00:00
db:PACKETSTORMid:130742date:2015-03-10T16:17:57
db:PACKETSTORMid:131932date:2015-05-20T22:44:42
db:PACKETSTORMid:130741date:2015-03-10T16:14:34
db:PACKETSTORMid:130743date:2015-03-10T16:20:32
db:CNNVDid:CNNVD-201503-235date:2015-03-11T00:00:00
db:NVDid:CVE-2015-1067date:2015-03-11T01:59:00.063