ID

VAR-201505-0233


CVE

CVE-2015-4000


TITLE

TLS Encryption problem vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-201505-428

DESCRIPTION

The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue. OpenSSL is prone to a security-bypass vulnerability because the application fails to properly verify SSL, TLS, and DTLS certificates. Successfully exploiting this issue allows attackers to perform man-in-the-middle attacks and bypass certain security restrictions. This may aid in further attacks. OpenSSL versions 1.0.2c, 1.0.2b, 1.0.1n, and 1.0.1o are vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04772190 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04772190 Version: 2 HPSBGN03402 rev.2 - HP Performance Manager, Remote Disclosure of Information NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2015-08-26 Last Updated: 2015-08-26 Potential Security Impact: Remote disclosure of information Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified in HP Performance Manager. - The TLS vulnerability using US export-grade 512-bit keys in Diffie-Hellman key exchange known as "Logjam" could be exploited remotely to allow unauthorized modification. - The RC4 stream cipher vulnerability in SSL/TLS known as "Bar Mitzvah" could be exploited remotely to allow disclosure of information. References: CVE-2015-4000 - "Logjam" CVE-2015-2808 - "Bar Mitzvah" SSRT102204, SSRT102208 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Performance Manager v9.0x and v9.20. BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2015-2808 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2015-4000 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has made the following mitigation information and software updates available to resolve the vulnerabilities for the impacted versions of HP Performance Manager. Please consult HP Software Support Online (SSO): CVE-2015-4000 - "Logjam" https://softwaresupport.hp.com/group/softwaresupport/search-result/-/fa cetsearch/document/KM01766982 CVE-2015-2808 - "Bar Mitzvah" https://softwaresupport.hp.com/group/softwaresupport/search-result/-/fa cetsearch/document/KM01766997?lang=en&cc=us&hpappid=113963_OSP_PRO_HPE HISTORY Version:1 (rev.1) - 26 August 2015 Initial release Version:2 (rev.2) - 26 August 2015 Added missing CVSS entry for CVE-2015-4000 Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. HP Service Manager Software 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40 Server BACKGROUND CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector CVE-2015-4000 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N) Information on CVSS is documented in HPE Customer Notice HPSN-2008-002 here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI d=emr_na-c01345499 RESOLUTION HPE has made the following mitigation information available to resolve the vulnerability for the impacted versions of HPE Service Manager: https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facetse arch/document/KM01728543 For versions 9.30, 9.31, 9.32, 9.33, 9.34 please: Upgrade to SM 9.35.P4 (recommended) or SM 9.34.P5 SM9.35 P4 package, SM 9.35 AIX Server 9.35.4001 p4 https://softwaresupport.hpe.com/km/KM02143332 SM 9.35 HP Itanium Server 9.35.4001 p4 https://softwaresupport.hpe.com/km/KM02143206 SM 9.35 HP Itanium Server for Oracle 12c 9.35.4001 p4 https://softwaresupport.hpe.com/km/KM02143388 SM 9.35 Linux Server 9.35.4001 p4 https://softwaresupport.hpe.com/km/KM02143530 SM 9.35 Solaris Server 9.35.4001 p4 https://softwaresupport.hpe.com/km/KM02143276 SM 9.35 Windows Server 9.35.4001 p4 https://softwaresupport.hpe.com/km/KM02143589 SM 9.34.P5 package, AIX Server 9.34.5003 p5 https://softwaresupport.hpe.com/km/KM02310304 HP Itanium Server 9.34.5003 p5 <[https://softwaresupport.hpe.com/km/KM02311066> Linux Server 9.34.5003 p5 https://softwaresupport.hpe.com/km/KM02310566 Solaris Server 9.34.5003 p5 https://softwaresupport.hpe.com/km/KM02311656 Windows Server 9.34.5003 p5 https://softwaresupport.hpe.com/km/KM02310486 For versions 9.35 please: Upgrade to SM 9.35.P4 SM9.35 P4 package, SM 9.35 AIX Server 9.35.4001 p4 https://softwaresupport.hpe.com/km/KM02143332 SM 9.35 HP Itanium Server 9.35.4001 p4 https://softwaresupport.hpe.com/km/KM02143206 SM 9.35 HP Itanium Server for Oracle 12c 9.35.4001 p4 https://softwaresupport.hpe.com/km/KM02143388 SM 9.35 Linux Server 9.35.4001 p4 https://softwaresupport.hpe.com/km/KM02143530 SM 9.35 Solaris Server 9.35.4001 p4 https://softwaresupport.hpe.com/km/KM02143276 SM 9.35 Windows Server 9.35.4001 p4 https://softwaresupport.hpe.com/km/KM02143589 For versions 9.40 please: Upgrade to SM 9.41.P3 SM9.41.P3 package, Service Manager 9.41.3016 p3 - Server for AIX https://softwaresupport.hpe.com/km/KM02236813 Service Manager 9.41.3016 p3 - Server for HP-UX/IA https://softwaresupport.hpe.com/km/KM02236897 Service Manager 9.41.3016 p3 - Server for Linux https://softwaresupport.hpe.com/km/KM02236827 Service Manager 9.41.3016 p3 - Server for Solaris https://softwaresupport.hpe.com/km/KM02236843 Service Manager 9.41.3016 p3 - Server for Windows https://softwaresupport.hpe.com/km/KM02236929 HISTORY Version:1 (rev.1) - 1 July 2016 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201506-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: OpenSSL: Multiple vulnerabilities Date: June 22, 2015 Bugs: #551832 ID: 201506-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in OpenSSL that can result in either Denial of Service or information disclosure. Background ========== OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security as well as a general purpose cryptography library. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-libs/openssl < 1.0.1o >= 0.9.8z_p7 >= 1.0.1o Description =========== Multiple vulnerabilities have been found in OpenSSL. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All OpenSSL 1.0.1 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.1o" All OpenSSL 0.9.8 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8z_p7" References ========== [ 1 ] CVE-2014-8176 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8176 [ 2 ] CVE-2015-1788 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1788 [ 3 ] CVE-2015-1789 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1789 [ 4 ] CVE-2015-1790 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1790 [ 5 ] CVE-2015-1791 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1791 [ 6 ] CVE-2015-1792 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1792 [ 7 ] CVE-2015-4000 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201506-02 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . + VCX v9.8.17 for the following Products/SKUs: - J9672A HP VCX V7205 Platform w/ DL360 G7 Srvr - J9668A HP VCX IPC V7005 Pltfrm w/ DL120 G6 Srvr - JC517A HP VCX V7205 Platform w/DL 360 G6 Server - JE355A HP VCX V6000 Branch Platform 9.0 - JC516A HP VCX V7005 Platform w/DL 120 G6 Server - JC518A HP VCX Connect 200 Primry 120 G6 Server - J9669A HP VCX IPC V7310 Pltfrm w/ DL360 G7 Srvr - JE341A HP VCX Connect 100 Secondary - JE252A HP VCX Connect Primary MIM Module - JE253A HP VCX Connect Secondary MIM Module - JE254A HP VCX Branch MIM Module - JE355A HP VCX V6000 Branch Platform 9.0 - JD028A HP MS30-40 RTR w/VCX + T1/FXO/FXS/Mod - JD023A HP MSR30-40 Router with VCX MIM Module - JD024A HP MSR30-16 RTR w/VCX Ent Br Com MIM - JD025A HP MSR30-16 RTR w/VCX + 4FXO/2FXS Mod - JD026A HP MSR30-16 RTR w/VCX + 8FXO/4FXS Mod - JD027A HP MSR30-16 RTR w/VCX + 8BRI/4FXS Mod - JD029A HP MSR30-16 RTR w/VCX + E1/4BRI/4FXS - JE340A HP VCX Connect 100 Pri Server 9.0 - JE342A HP VCX Connect 100 Sec Server 9.0 HISTORY Version:1 (rev.1) - 16 December 2015 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. (CVE-2015-2721) Bob Clary, Christian Holler, Bobby Holley, and Andrew McCreight discovered multiple memory safety issues in Thunderbird. (CVE-2015-2724) Ronald Crane discovered multiple security vulnerabilities. (CVE-2015-2734, CVE-2015-2735, CVE-2015-2736, CVE-2015-2737, CVE-2015-2738, CVE-2015-2739, CVE-2015-2740) Matthew Green discovered a DHE key processing issue in NSS where a MITM could force a server to downgrade TLS connections to 512-bit export-grade cryptography. HP Operations Agent Virtual Appliance v11.11, v11.12, v11.13, v11.14. 6) - i386, x86_64 3. Description: IBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. (CVE-2015-1931, CVE-2015-2590, CVE-2015-2601, CVE-2015-2621, CVE-2015-2625, CVE-2015-2632, CVE-2015-2637, CVE-2015-2638, CVE-2015-2664, CVE-2015-4000, CVE-2015-4731, CVE-2015-4732, CVE-2015-4733, CVE-2015-4748, CVE-2015-4749, CVE-2015-4760) Note: This update forces the TLS/SSL client implementation in IBM JDK to reject DH key sizes below 768 bits to address the CVE-2015-4000 issue. Refer to Red Hat Bugzilla bug 1223211, linked to in the References section, for additional details about this change. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/): 1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks 1241965 - CVE-2015-2625 OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) 1242019 - CVE-2015-2601 OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) 1242234 - CVE-2015-4731 OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) 1242240 - CVE-2015-4732 OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) 1242275 - CVE-2015-4733 OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) 1242281 - CVE-2015-4748 OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) 1242372 - CVE-2015-2621 OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) 1242379 - CVE-2015-4749 OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) 1242394 - CVE-2015-2632 ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) 1242447 - CVE-2015-4760 ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715) 1243139 - CVE-2015-2590 OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401) 1243283 - CVE-2015-2638 Oracle JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) 1243287 - CVE-2015-2637 Oracle JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) 1243300 - CVE-2015-2664 Oracle JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (Deployment) 1244828 - CVE-2015-1931 IBM JDK: plain text data stored in memory dumps 6. Unlike the TLS server-side version of Logjam, this vulnerability affects the client-side TLS connection on iLO, or when the iLO acts as a client in a client-server connection. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat JBoss Enterprise Application Platform 6.4.10 natives update on RHEL 7 Advisory ID: RHSA-2016:2054-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2054.html Issue date: 2016-10-12 CVE Names: CVE-2015-3183 CVE-2015-3195 CVE-2015-4000 CVE-2016-2105 CVE-2016-2106 CVE-2016-2108 CVE-2016-2109 CVE-2016-3110 CVE-2016-4459 ===================================================================== 1. Summary: Updated packages that provide Red Hat JBoss Enterprise Application Platform 6.4.10 natives, fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server - noarch, ppc64, x86_64 3. Description: Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. This release includes bug fixes and enhancements, as well as a new release of OpenSSL that addresses a number of outstanding security flaws. For further information, see the knowledge base article linked to in the References section. All users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat Enterprise Linux 7 are advised to upgrade to these updated packages. The JBoss server process must be restarted for the update to take effect. Security Fix(es): * A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library. (CVE-2016-2108) * Multiple flaws were found in the way httpd parsed HTTP requests and responses using chunked transfer encoding. A remote attacker could use these flaws to create a specially crafted request, which httpd would decode differently from an HTTP proxy software in front of it, possibly leading to HTTP request smuggling attacks. (CVE-2015-3183) * A memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and CMS data. A remote attacker could use this flaw to cause an application that parses PKCS#7 or CMS data from untrusted sources to use an excessive amount of memory and possibly crash. (CVE-2015-3195) * A flaw was found in the way the TLS protocol composes the Diffie-Hellman exchange (for both export and non-export grade cipher suites). An attacker could use this flaw to downgrade a DHE connection to use export-grade key sizes, which could then be broken by sufficient pre-computation. This can lead to a passive man-in-the-middle attack in which the attacker is able to decrypt all traffic. (CVE-2015-4000) * An integer overflow flaw, leading to a buffer overflow, was found in the way the EVP_EncodeUpdate() function of OpenSSL parsed very large amounts of input data. A remote attacker could use this flaw to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application. (CVE-2016-2105) * An integer overflow flaw, leading to a buffer overflow, was found in the way the EVP_EncryptUpdate() function of OpenSSL parsed very large amounts of input data. A remote attacker could use this flaw to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application. (CVE-2016-2106) * It was discovered that it is possible to remotely Segfault Apache http server with a specially crafted string sent to the mod_cluster via service messages (MCMP). (CVE-2016-3110) * A denial of service flaw was found in the way OpenSSL parsed certain ASN.1-encoded data from BIO (OpenSSL's I/O abstraction) inputs. An application using OpenSSL that accepts untrusted ASN.1 BIO input could be forced to allocate an excessive amount of data. (CVE-2016-2109) * It was discovered that specifying configuration with a JVMRoute path longer than 80 characters will cause segmentation fault leading to a server crash. (CVE-2016-4459) Red Hat would like to thank the OpenSSL project for reporting CVE-2016-2108, CVE-2016-2105, and CVE-2016-2106 and Michal Karm Babacek for reporting CVE-2016-3110. The CVE-2016-4459 issue was discovered by Robert Bost (Red Hat). Upstream acknowledges Huzaifa Sidhpurwala (Red Hat), Hanno BAPck, and David Benjamin (Google) as the original reporters of CVE-2016-2108; and Guido Vranken as the original reporter of CVE-2016-2105 and CVE-2016-2106. 4. Solution: Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications. For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. 5. Bugs fixed (https://bugzilla.redhat.com/): 1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks 1243887 - CVE-2015-3183 httpd: HTTP request smuggling attack against chunked request parser 1288322 - CVE-2015-3195 OpenSSL: X509_ATTRIBUTE memory leak 1326320 - CVE-2016-3110 mod_cluster: remotely Segfault Apache http server 1330101 - CVE-2016-2109 openssl: ASN.1 BIO handling of large amounts of data 1331402 - CVE-2016-2108 openssl: Memory corruption in the ASN.1 encoder 1331441 - CVE-2016-2105 openssl: EVP_EncodeUpdate overflow 1331536 - CVE-2016-2106 openssl: EVP_EncryptUpdate overflow 1341583 - CVE-2016-4459 mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute 1345989 - RHEL7 RPMs: Upgrade mod_cluster-native to 1.2.13.Final-redhat-1 1345993 - RHEL7 RPMs: Upgrade mod_jk to 1.2.41.redhat-1 1345997 - RHEL7 RPMs: Upgrade tomcat-native to 1.1.34 6. Package List: Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server: Source: hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el7.src.rpm httpd22-2.2.26-56.ep6.el7.src.rpm jbcs-httpd24-openssl-1.0.2h-4.jbcs.el7.src.rpm mod_jk-1.2.41-2.redhat_4.ep6.el7.src.rpm tomcat-native-1.1.34-5.redhat_1.ep6.el7.src.rpm noarch: jbcs-httpd24-1-3.jbcs.el7.noarch.rpm jbcs-httpd24-runtime-1-3.jbcs.el7.noarch.rpm ppc64: hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el7.ppc64.rpm hornetq-native-debuginfo-2.3.25-4.SP11_redhat_1.ep6.el7.ppc64.rpm httpd22-2.2.26-56.ep6.el7.ppc64.rpm httpd22-debuginfo-2.2.26-56.ep6.el7.ppc64.rpm httpd22-devel-2.2.26-56.ep6.el7.ppc64.rpm httpd22-manual-2.2.26-56.ep6.el7.ppc64.rpm httpd22-tools-2.2.26-56.ep6.el7.ppc64.rpm jbcs-httpd24-openssl-1.0.2h-4.jbcs.el7.ppc64.rpm jbcs-httpd24-openssl-debuginfo-1.0.2h-4.jbcs.el7.ppc64.rpm jbcs-httpd24-openssl-devel-1.0.2h-4.jbcs.el7.ppc64.rpm jbcs-httpd24-openssl-libs-1.0.2h-4.jbcs.el7.ppc64.rpm jbcs-httpd24-openssl-perl-1.0.2h-4.jbcs.el7.ppc64.rpm jbcs-httpd24-openssl-static-1.0.2h-4.jbcs.el7.ppc64.rpm jbossas-hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el7.ppc64.rpm jbossas-jbossweb-native-1.1.34-5.redhat_1.ep6.el7.ppc64.rpm mod_jk-ap22-1.2.41-2.redhat_4.ep6.el7.ppc64.rpm mod_jk-debuginfo-1.2.41-2.redhat_4.ep6.el7.ppc64.rpm mod_ldap22-2.2.26-56.ep6.el7.ppc64.rpm mod_ssl22-2.2.26-56.ep6.el7.ppc64.rpm tomcat-native-1.1.34-5.redhat_1.ep6.el7.ppc64.rpm tomcat-native-debuginfo-1.1.34-5.redhat_1.ep6.el7.ppc64.rpm x86_64: hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el7.x86_64.rpm hornetq-native-debuginfo-2.3.25-4.SP11_redhat_1.ep6.el7.x86_64.rpm httpd22-2.2.26-56.ep6.el7.x86_64.rpm httpd22-debuginfo-2.2.26-56.ep6.el7.x86_64.rpm httpd22-devel-2.2.26-56.ep6.el7.x86_64.rpm httpd22-manual-2.2.26-56.ep6.el7.x86_64.rpm httpd22-tools-2.2.26-56.ep6.el7.x86_64.rpm jbcs-httpd24-openssl-1.0.2h-4.jbcs.el7.x86_64.rpm jbcs-httpd24-openssl-debuginfo-1.0.2h-4.jbcs.el7.x86_64.rpm jbcs-httpd24-openssl-devel-1.0.2h-4.jbcs.el7.x86_64.rpm jbcs-httpd24-openssl-libs-1.0.2h-4.jbcs.el7.x86_64.rpm jbcs-httpd24-openssl-perl-1.0.2h-4.jbcs.el7.x86_64.rpm jbcs-httpd24-openssl-static-1.0.2h-4.jbcs.el7.x86_64.rpm jbossas-hornetq-native-2.3.25-4.SP11_redhat_1.ep6.el7.x86_64.rpm jbossas-jbossweb-native-1.1.34-5.redhat_1.ep6.el7.x86_64.rpm mod_jk-ap22-1.2.41-2.redhat_4.ep6.el7.x86_64.rpm mod_jk-debuginfo-1.2.41-2.redhat_4.ep6.el7.x86_64.rpm mod_ldap22-2.2.26-56.ep6.el7.x86_64.rpm mod_ssl22-2.2.26-56.ep6.el7.x86_64.rpm tomcat-native-1.1.34-5.redhat_1.ep6.el7.x86_64.rpm tomcat-native-debuginfo-1.1.34-5.redhat_1.ep6.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3183 https://access.redhat.com/security/cve/CVE-2015-3195 https://access.redhat.com/security/cve/CVE-2015-4000 https://access.redhat.com/security/cve/CVE-2016-2105 https://access.redhat.com/security/cve/CVE-2016-2106 https://access.redhat.com/security/cve/CVE-2016-2108 https://access.redhat.com/security/cve/CVE-2016-2109 https://access.redhat.com/security/cve/CVE-2016-3110 https://access.redhat.com/security/cve/CVE-2016-4459 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/articles/2688611 https://access.redhat.com/solutions/222023 https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.4/index.html https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.4 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX/nCuXlSAg2UNWIIRAq6gAKCk3O4+LVrC6nN6yUHOOzpm8GB7NQCcDcA0 n7n6E5uqbAY0W1AG5Z+9yy8= =6ET2 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Customers unable to apply the update should contact HPE Support to discuss options. ========================================================================== Ubuntu Security Notice USN-2706-1 August 06, 2015 openjdk-6 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 LTS Summary: Several security issues were fixed in OpenJDK 6. Software Description: - openjdk-6: Open Source Java implementation Details: Several vulnerabilities were discovered in the OpenJDK JRE related to information disclosure, data integrity, and availability. An attacker could exploit these to cause a denial of service or expose sensitive data over the network. (CVE-2015-2590, CVE-2015-2628, CVE-2015-4731, CVE-2015-4732, CVE-2015-4733, CVE-2015-4760, CVE-2015-4748) Several vulnerabilities were discovered in the cryptographic components of the OpenJDK JRE. An attacker could exploit these to expose sensitive data over the network. (CVE-2015-2601, CVE-2015-2808, CVE-2015-4000, CVE-2015-2625, CVE-2015-2613) As a security improvement, this update modifies OpenJDK behavior to disable RC4 TLS/SSL cipher suites by default. An attacker could exploit these to expose sensitive data over the network. (CVE-2015-2621, CVE-2015-2632) A vulnerability was discovered with how the JNDI component of the OpenJDK JRE handles DNS resolutions. A remote attacker could exploit this to cause a denial of service. (CVE-2015-4749) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 LTS: icedtea-6-jre-cacao 6b36-1.13.8-0ubuntu1~12.04 icedtea-6-jre-jamvm 6b36-1.13.8-0ubuntu1~12.04 openjdk-6-jdk 6b36-1.13.8-0ubuntu1~12.04 openjdk-6-jre 6b36-1.13.8-0ubuntu1~12.04 openjdk-6-jre-headless 6b36-1.13.8-0ubuntu1~12.04 openjdk-6-jre-lib 6b36-1.13.8-0ubuntu1~12.04 openjdk-6-jre-zero 6b36-1.13.8-0ubuntu1~12.04 openjdk-6-source 6b36-1.13.8-0ubuntu1~12.04 This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any Java applications or applets to make all the necessary changes. The References section of this erratum contains a download link (you must log in to download the update). Note: This vulnerability is in the TLS protocol and not specific to HP Project and Portfolio Management Center. HP Service Health Reporter v9.20, v9.30, v9.31, v9.32, and v9.40

Trust: 2.61

sources: NVD: CVE-2015-4000 // BID: 75652 // PACKETSTORM: 133344 // PACKETSTORM: 137744 // PACKETSTORM: 132398 // PACKETSTORM: 134902 // PACKETSTORM: 132757 // PACKETSTORM: 133338 // PACKETSTORM: 132803 // PACKETSTORM: 132652 // PACKETSTORM: 135506 // PACKETSTORM: 132894 // PACKETSTORM: 139114 // PACKETSTORM: 136247 // PACKETSTORM: 132989 // PACKETSTORM: 139116 // PACKETSTORM: 134232 // PACKETSTORM: 133324

AFFECTED PRODUCTS

vendor:mozillamodel:firefox osscope:eqversion:2.2

Trust: 1.6

vendor:mozillamodel:firefox esrscope:eqversion:31.8

Trust: 1.6

vendor:mozillamodel:thunderbirdscope:eqversion:31.8

Trust: 1.6

vendor:mozillamodel:thunderbirdscope:eqversion:38.1

Trust: 1.6

vendor:mozillamodel:seamonkeyscope:eqversion:2.35

Trust: 1.6

vendor:mozillamodel:firefoxscope:eqversion:39.0

Trust: 1.6

vendor:oraclemodel:jrockitscope:eqversion:r28.3.6

Trust: 1.0

vendor:oraclemodel:sparc-opl service processorscope:lteversion:1121

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.6.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.10

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:hpmodel:hp-uxscope:eqversion:b.11.31

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:12

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.0.2

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.19

Trust: 1.0

vendor:applemodel:iphone osscope:lteversion:8.3

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:38.1.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:15.04

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.8.0

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.7.0

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.6.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.8.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion: -

Trust: 1.0

vendor:opensslmodel:opensslscope:lteversion:1.0.2a

Trust: 1.0

vendor:applemodel:mac os xscope:lteversion:10.10.3

Trust: 1.0

vendor:opensslmodel:opensslscope:lteversion:1.0.1m

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.7.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.0.1

Trust: 1.0

vendor:microsoftmodel:internet explorerscope:eqversion: -

Trust: 1.0

vendor:googlemodel:chromescope:eqversion: -

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion: -

Trust: 1.0

vendor:ibmmodel:content managerscope:eqversion:8.5

Trust: 1.0

vendor:susemodel:linux enterprise software development kitscope:eqversion:12

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:11.0

Trust: 1.0

vendor:operamodel:browserscope:eqversion: -

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:12

Trust: 1.0

vendor:junipermodel:junos 12.1x44-d20scope: - version: -

Trust: 0.9

vendor:junipermodel:junos 12.1x46-d25scope: - version: -

Trust: 0.6

vendor:mozillamodel:firefox esrscope:eqversion:38.1.0

Trust: 0.6

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.2.0.3

Trust: 0.3

vendor:ibmmodel:security network controller 1.0.3361mscope: - version: -

Trust: 0.3

vendor:ciscomodel:registered envelope servicescope:eqversion:0

Trust: 0.3

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.53

Trust: 0.3

vendor:hpmodel:hp-ux b.11.22scope: - version: -

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d33scope: - version: -

Trust: 0.3

vendor:ibmmodel:i v5r4scope:eqversion:6.1

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:8.2

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d25scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.1r3scope: - version: -

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:9.1.1

Trust: 0.3

vendor:oraclemodel:enterprise manager base platformscope:eqversion:12.1.0.4

Trust: 0.3

vendor:ibmmodel:worklight foundation consumer editionscope:eqversion:6.20

Trust: 0.3

vendor:junipermodel:junos 13.3r5scope: - version: -

Trust: 0.3

vendor:ibmmodel:rational tauscope:eqversion:4.35

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.1209

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.1.0.4

Trust: 0.3

vendor:ibmmodel:i v5r3scope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:netinsightscope:eqversion:8.6.0

Trust: 0.3

vendor:oraclemodel:agile engineering data managementscope:eqversion:6.1.2.2

Trust: 0.3

vendor:ciscomodel:ios xescope:neversion:3.14

Trust: 0.3

vendor:ibmmodel:rational automation framework ifix5scope:neversion:3.0.1.3

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d35scope: - version: -

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.3361

Trust: 0.3

vendor:ibmmodel:rational automation frameworkscope:eqversion:3.0.1.1

Trust: 0.3

vendor:oraclemodel:jd edwards enterpriseone toolsscope:eqversion:9.2

Trust: 0.3

vendor:hpmodel:hp-ux b.11.04scope: - version: -

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.13-34

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d51scope: - version: -

Trust: 0.3

vendor:ciscomodel:prime license managerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:worklight foundation enterprise editionscope:eqversion:6.20

Trust: 0.3

vendor:ciscomodel:agent for openflowscope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d34scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r6scope: - version: -

Trust: 0.3

vendor:ibmmodel:rational automation frameworkscope:eqversion:3.0.1.3

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.1

Trust: 0.3

vendor:hpmodel:imc productsscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:digital media players series 5.4 rbscope:neversion:4400

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d10scope: - version: -

Trust: 0.3

vendor:ciscomodel:digital media players seriesscope:eqversion:44000

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.16-37

Trust: 0.3

vendor:ciscomodel:digital media players 5.3 rbscope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d50scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r4scope: - version: -

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.11

Trust: 0.3

vendor:ibmmodel:rational application developer for webspherescope:eqversion:9.1.1

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:11.1

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d15scope: - version: -

Trust: 0.3

vendor:ibmmodel:rational application developer for webspherescope:eqversion:9.1

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.4-23

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:neversion:10.0

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.25-57

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.18-43

Trust: 0.3

vendor:ciscomodel:telepresence conductor xc4.0scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios xescope:neversion:3.16

Trust: 0.3

vendor:ibmmodel:security appscan enterprisescope:eqversion:9.0.1

Trust: 0.3

vendor:oraclemodel:ethernet switch es2-64scope:neversion:2.0.0.6

Trust: 0.3

vendor:ciscomodel:ios xescope:neversion:3.15

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:11.1.3

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.913

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d20scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.3r2scope: - version: -

Trust: 0.3

vendor:ibmmodel:aspera enterprise serverscope:eqversion:3.5.5

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.20

Trust: 0.3

vendor:junipermodel:junos d30scope:eqversion:12.1x44

Trust: 0.3

vendor:ciscomodel:local collector appliancescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:mobilefirst platform foundationscope:eqversion:6.3.0.0

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:neversion:12.2

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.11-28

Trust: 0.3

vendor:ibmmodel:security appscan enterprisescope:eqversion:9.0.2

Trust: 0.3

vendor:oraclemodel:ethernet switch es2-72scope:neversion:2.0.0.6

Trust: 0.3

vendor:junipermodel:junos 15.1r2scope:neversion: -

Trust: 0.3

vendor:ibmmodel:rational tauscope:eqversion:4.36

Trust: 0.3

vendor:ibmmodel:security network controller 1.0.3350mscope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.2r1scope: - version: -

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.3

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:neversion:10.5.1

Trust: 0.3

vendor:junipermodel:junos 14.1r2scope: - version: -

Trust: 0.3

vendor:oraclemodel:ethernet switch es2-64scope:eqversion:1.9.1

Trust: 0.3

vendor:oraclemodel:enterprise manager base platformscope:eqversion:12.1.0.5

Trust: 0.3

vendor:ibmmodel:rational tauscope:eqversion:4.34

Trust: 0.3

vendor:ciscomodel:digital media players 5.4 rbscope:neversion: -

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.5

Trust: 0.3

vendor:ibmmodel:rational automation frameworkscope:eqversion:3.0.1

Trust: 0.3

vendor:oraclemodel:jd edwards world security a9.4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r4scope: - version: -

Trust: 0.3

vendor:oraclemodel:sun blade ethernet switched nem 24p 10gescope:eqversion:60000

Trust: 0.3

vendor:ciscomodel:packet tracerscope:eqversion:5.2

Trust: 0.3

vendor:ciscomodel:registered envelope servicescope:neversion:4.4.1

Trust: 0.3

vendor:ibmmodel:aspera orchestratorscope:eqversion:2.3

Trust: 0.3

vendor:junipermodel:junos 12.3r6scope: - version: -

Trust: 0.3

vendor:oraclemodel:ethernet switch es2-72scope:eqversion:1.9.1

Trust: 0.3

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.54

Trust: 0.3

vendor:ciscomodel:partner supporting servicescope:eqversion:0

Trust: 0.3

vendor:oraclemodel:oss support toolsscope:eqversion:8.9.15.9.8

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d20scope: - version: -

Trust: 0.3

vendor:ibmmodel:worklight consumer editionscope:eqversion:6.1.0.0

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.15-36

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d55scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos d40scope:eqversion:12.1x44

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d30.4scope: - version: -

Trust: 0.3

vendor:ciscomodel:prime collaboration deploymentscope:eqversion:0

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1pscope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1r1scope: - version: -

Trust: 0.3

vendor:ibmmodel:security network controller 1.0.3379mscope: - version: -

Trust: 0.3

vendor:ciscomodel:packet tracerscope:eqversion:5.3

Trust: 0.3

vendor:junipermodel:junos d20scope:eqversion:12.1x44

Trust: 0.3

vendor:hpmodel:comware productsscope:eqversion:50

Trust: 0.3

vendor:ciscomodel:prime network services controller 3.4.1cscope:neversion: -

Trust: 0.3

vendor:ibmmodel:rational application developer for webspherescope:eqversion:9.1.0.1

Trust: 0.3

vendor:oraclemodel:endeca serverscope:eqversion:7.6.0

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11.16.09scope: - version: -

Trust: 0.3

vendor:oraclemodel:integrated lights out managerscope:eqversion:3.2

Trust: 0.3

vendor:ciscomodel:jabber software development kitscope:eqversion:0

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:14.1

Trust: 0.3

vendor:ibmmodel:rational automation frameworkscope:eqversion:3.0.1.2

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.21

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d10scope: - version: -

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.1768

Trust: 0.3

vendor:oraclemodel:business intelligence enterprise editionscope:eqversion:11.1.1.9

Trust: 0.3

vendor:ciscomodel:webex messenger service ep1scope:neversion:7.9.9

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.15

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:9.1

Trust: 0.3

vendor:oraclemodel:switch es1-24scope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:1.0.2919

Trust: 0.3

vendor:ibmmodel:worklight enterprise editionscope:eqversion:6.1.0.0

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11.13.14scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r6scope:neversion: -

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.15

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.25

Trust: 0.3

vendor:hpmodel:comware productsscope:eqversion:70

Trust: 0.3

vendor:ibmmodel:worklight consumer editionscope:eqversion:6.1.0.2

Trust: 0.3

vendor:oraclemodel:integrated lights out managerscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:ios xescope:neversion:3.13

Trust: 0.3

vendor:freebsdmodel:10.1-stablescope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23.1.007scope: - version: -

Trust: 0.3

vendor:oraclemodel:endeca serverscope:eqversion:7.5.0

Trust: 0.3

vendor:oraclemodel:sun network 10ge switch 72pscope:eqversion:0

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11scope: - version: -

Trust: 0.3

vendor:oraclemodel:integrated lights out managerscope:eqversion:3.1

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:8.5

Trust: 0.3

vendor:ciscomodel:prime security managerscope:neversion:9.3.4.2-4

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:14.1

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.29-9

Trust: 0.3

vendor:oraclemodel:business intelligence enterprise editionscope:eqversion:11.1.1.7

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:8.6

Trust: 0.3

vendor:ciscomodel:industrial routerscope:eqversion:9100

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:9.0

Trust: 0.3

vendor:ibmmodel:security network controller 1.0.3352mscope: - version: -

Trust: 0.3

vendor:ciscomodel:security manager sp1scope:neversion:4.8

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:neversion:12.1.4

Trust: 0.3

vendor:ibmmodel:rational tau interim fixscope:eqversion:4.3.0.6

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:50000

Trust: 0.3

vendor:ibmmodel:infosphere information serverscope:eqversion:11.3

Trust: 0.3

vendor:ciscomodel:local collector appliancescope:neversion:2.2.10

Trust: 0.3

vendor:ibmmodel:i v5r4scope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.0

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1nscope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1oscope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d26scope: - version: -

Trust: 0.3

vendor:slackwaremodel:linux x86 64 -currentscope: - version: -

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:14.0

Trust: 0.3

vendor:junipermodel:junos 14.2r2scope: - version: -

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:neversion:12.3

Trust: 0.3

vendor:ibmmodel:i v5r3scope:eqversion:7.1

Trust: 0.3

vendor:ciscomodel:digital media playersscope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos d10scope:eqversion:12.1x44

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d35scope: - version: -

Trust: 0.3

vendor:ibmmodel:i v5r4scope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.2

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11.02.008scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d25scope: - version: -

Trust: 0.3

vendor:ibmmodel:netezza host managementscope:eqversion:5.3.2.0

Trust: 0.3

vendor:ciscomodel:prime network services controllerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:i v5r3scope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:aspera point to pointscope:eqversion:3.5.5

Trust: 0.3

vendor:ciscomodel:webex messenger servicescope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d55scope:neversion: -

Trust: 0.3

vendor:ibmmodel:netinsightscope:neversion:8.6.0.14

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d11scope: - version: -

Trust: 0.3

vendor:junipermodel:junos d25scope:eqversion:12.1x46

Trust: 0.3

vendor:junipermodel:junos 12.3r3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r7scope: - version: -

Trust: 0.3

vendor:ciscomodel:security managerscope:eqversion:0

Trust: 0.3

vendor:huaweimodel:esight network v300r003c10spc201scope:neversion: -

Trust: 0.3

vendor:oraclemodel:agile engineering data managementscope:eqversion:6.1.3.0

Trust: 0.3

vendor:ciscomodel:socialminerscope:neversion:11.5.1

Trust: 0.3

vendor:junipermodel:junos 14.2r4scope:neversion: -

Trust: 0.3

vendor:oraclemodel:endeca serverscope:eqversion:7.3.0

Trust: 0.3

vendor:ibmmodel:aspera faspex applicationscope:eqversion:3.9.2

Trust: 0.3

vendor:ciscomodel:asa cx and cisco prime security managerscope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d40scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos d25scope:eqversion:12.1x44

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d20scope: - version: -

Trust: 0.3

vendor:ciscomodel:socialminerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:8.1

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:neversion:10.6

Trust: 0.3

vendor:ibmmodel:security appscan enterprisescope:eqversion:9.0

Trust: 0.3

vendor:ciscomodel:model d9485 davic qpskscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.24

Trust: 0.3

vendor:junipermodel:junos d35scope:eqversion:12.1x44

Trust: 0.3

vendor:hpmodel:vcx productsscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:agile engineering data managementscope:eqversion:6.2.0.0

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d45scope:neversion: -

Trust: 0.3

vendor:ciscomodel:nexus series fexscope:eqversion:20000

Trust: 0.3

vendor:oraclemodel:tuxedoscope:eqversion:12.1.1.0

Trust: 0.3

vendor:ibmmodel:security network controller 1.0.3381mscope: - version: -

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:neversion:9.5

Trust: 0.3

vendor:ibmmodel:netezza host managementscope:eqversion:5.3.3

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d40scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d30scope: - version: -

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:neversion:12.2.1

Trust: 0.3

vendor:ibmmodel:rational tau interim fixscope:neversion:4.3.0.6

Trust: 0.3

vendor:ciscomodel:digital media players series 5.4 rbscope:neversion:4300

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d30scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11.17.02scope: - version: -

Trust: 0.3

vendor:ciscomodel:prime security managerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.18-49

Trust: 0.3

vendor:ibmmodel:infosphere information serverscope:eqversion:9.1

Trust: 0.3

vendor:hpmodel:hp-ux b.11.00scope: - version: -

Trust: 0.3

vendor:ciscomodel:virtual security gatewayscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:puredata system for analyticsscope:eqversion:1.0

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.3

vendor:ciscomodel:industrial router 1.2.1rb3scope:neversion:910

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.13-41

Trust: 0.3

vendor:ibmmodel:aspera consolescope:eqversion:3.0.1

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:14.0

Trust: 0.3

vendor:ibmmodel:rational tauscope:eqversion:4.31

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23.07.04scope: - version: -

Trust: 0.3

vendor:ibmmodel:netezza host managementscope:neversion:5.3.7.0

Trust: 0.3

vendor:ciscomodel:unified attendant console standardscope:eqversion:0

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2dscope:neversion: -

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:8.3

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d10scope: - version: -

Trust: 0.3

vendor:oraclemodel:jd edwards enterpriseone toolsscope:eqversion:9.1

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.3381

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.9-34

Trust: 0.3

vendor:ciscomodel:digital media players seriesscope:eqversion:43000

Trust: 0.3

vendor:ibmmodel:security proventia network active bypass 0343c3cscope: - version: -

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.23

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d40scope:neversion: -

Trust: 0.3

vendor:ibmmodel:infosphere information serverscope:eqversion:8.5

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:12.1

Trust: 0.3

vendor:junipermodel:junos 12.3r11scope:neversion: -

Trust: 0.3

vendor:ibmmodel:aspera proxyscope:eqversion:1.2.2

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:worklight consumer editionscope:eqversion:6.1.0.1

Trust: 0.3

vendor:junipermodel:junos 13.3r7scope:neversion: -

Trust: 0.3

vendor:huaweimodel:esight network v300r003c10spc100scope: - version: -

Trust: 0.3

vendor:junipermodel:junosscope:eqversion:12.1x47

Trust: 0.3

vendor:ibmmodel:aspera sharesscope:eqversion:1.9.2

Trust: 0.3

vendor:oraclemodel:solarisscope:eqversion:11.2

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d10scope: - version: -

Trust: 0.3

vendor:oraclemodel:switch es1-24scope:eqversion:1.3

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.3376

Trust: 0.3

vendor:oraclemodel:endeca serverscope:eqversion:7.4

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.18-42

Trust: 0.3

vendor:ibmmodel:worklight enterprise editionscope:eqversion:6.1.0.2

Trust: 0.3

vendor:junipermodel:junos 14.1r5scope: - version: -

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.2.0.4

Trust: 0.3

vendor:ibmmodel:aspera enterprise server clientscope:eqversion:3.5.5

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.1.1

Trust: 0.3

vendor:ibmmodel:worklight foundation consumer editionscope:eqversion:6.2.0.1

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.16

Trust: 0.3

vendor:ibmmodel:aspera ondemandscope:eqversion:3.5.4

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r9scope: - version: -

Trust: 0.3

vendor:ciscomodel:telepresence conductorscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.1

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:1.0.1876

Trust: 0.3

vendor:ciscomodel:digital media players series 5.3 rbscope:neversion:4300

Trust: 0.3

vendor:ibmmodel:worklight enterprise editionscope:eqversion:6.1.0.1

Trust: 0.3

vendor:ciscomodel:connected analytics for collaborationscope:eqversion:0

Trust: 0.3

vendor:hpmodel:cloud service automationscope:eqversion:4.5

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d26scope: - version: -

Trust: 0.3

vendor:ibmmodel:worklight foundation enterprise editionscope:eqversion:6.2.0.1

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11.14.15scope: - version: -

Trust: 0.3

vendor:ciscomodel:webex node for mcsscope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d35.5scope: - version: -

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d30scope:neversion: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2cscope: - version: -

Trust: 0.3

vendor:ibmmodel:rational tauscope:eqversion:4.32

Trust: 0.3

vendor:ciscomodel:virtual security gateway for microsoft hyper-vscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:sun blade ethernet switched nem 24p 10gescope:neversion:60001.2.2.13

Trust: 0.3

vendor:ciscomodel:services analytic platformscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:switch es1-24scope:neversion:1.3.1.3

Trust: 0.3

vendor:ciscomodel:security managerscope:neversion:4.9

Trust: 0.3

vendor:ibmmodel:security network controller 1.0.3376mscope: - version: -

Trust: 0.3

vendor:ibmmodel:infosphere information serverscope:eqversion:8.1

Trust: 0.3

vendor:ibmmodel:rational tauscope:eqversion:4.3

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.3379

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d15scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2bscope: - version: -

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.22

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d36scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d25scope: - version: -

Trust: 0.3

vendor:ciscomodel:network performance analyticsscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:mobilefirst platform foundationscope:eqversion:7.0.0.0

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11.15.13scope: - version: -

Trust: 0.3

vendor:ciscomodel:emergency responderscope: - version: -

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.6

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.0

Trust: 0.3

vendor:ibmmodel:infosphere information serverscope:eqversion:8.7

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d20scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.2r3scope: - version: -

Trust: 0.3

vendor:ciscomodel:model d9485 davic qpskscope:neversion:1.2.19

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:12.1.0.1

Trust: 0.3

vendor:ibmmodel:rational tauscope:eqversion:4.33

Trust: 0.3

vendor:ibmmodel:netezza host managementscope:eqversion:5.3.6.0

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d15scope: - version: -

Trust: 0.3

vendor:oraclemodel:sun network 10ge switch 72pscope:neversion:1.2.2.15

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d15scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d32scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d30scope: - version: -

Trust: 0.3

vendor:ciscomodel:im and presence servicescope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos 12.3r10scope: - version: -

Trust: 0.3

vendor:ciscomodel:digital media players series 5.3 rbscope:neversion:4400

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d15scope: - version: -

Trust: 0.3

sources: BID: 75652 // CNNVD: CNNVD-201505-428 // NVD: CVE-2015-4000

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-4000
value: LOW

Trust: 1.0

CNNVD: CNNVD-201505-428
value: LOW

Trust: 0.6

nvd@nist.gov: CVE-2015-4000
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

nvd@nist.gov: CVE-2015-4000
baseSeverity: LOW
baseScore: 3.7
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 1.4
version: 3.0

Trust: 1.0

sources: CNNVD: CNNVD-201505-428 // NVD: CVE-2015-4000

PROBLEMTYPE DATA

problemtype:CWE-310

Trust: 1.0

sources: NVD: CVE-2015-4000

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 132757 // CNNVD: CNNVD-201505-428

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201505-428

PATCH

title:TLS Fixing measures for protocol encryption problem vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=89458

Trust: 0.6

sources: CNNVD: CNNVD-201505-428

EXTERNAL IDS

db:NVDid:CVE-2015-4000

Trust: 3.5

db:SECTRACKid:1033891

Trust: 1.6

db:SECTRACKid:1032932

Trust: 1.6

db:SECTRACKid:1036218

Trust: 1.6

db:SECTRACKid:1033341

Trust: 1.6

db:SECTRACKid:1033513

Trust: 1.6

db:SECTRACKid:1032654

Trust: 1.6

db:SECTRACKid:1032650

Trust: 1.6

db:SECTRACKid:1032649

Trust: 1.6

db:SECTRACKid:1032871

Trust: 1.6

db:SECTRACKid:1032653

Trust: 1.6

db:SECTRACKid:1034728

Trust: 1.6

db:SECTRACKid:1034884

Trust: 1.6

db:SECTRACKid:1033222

Trust: 1.6

db:SECTRACKid:1032699

Trust: 1.6

db:SECTRACKid:1032759

Trust: 1.6

db:SECTRACKid:1033064

Trust: 1.6

db:SECTRACKid:1032476

Trust: 1.6

db:SECTRACKid:1032688

Trust: 1.6

db:SECTRACKid:1040630

Trust: 1.6

db:SECTRACKid:1032645

Trust: 1.6

db:SECTRACKid:1032475

Trust: 1.6

db:SECTRACKid:1032656

Trust: 1.6

db:SECTRACKid:1034087

Trust: 1.6

db:SECTRACKid:1032648

Trust: 1.6

db:SECTRACKid:1033065

Trust: 1.6

db:SECTRACKid:1032856

Trust: 1.6

db:SECTRACKid:1033416

Trust: 1.6

db:SECTRACKid:1032864

Trust: 1.6

db:SECTRACKid:1033208

Trust: 1.6

db:SECTRACKid:1032702

Trust: 1.6

db:SECTRACKid:1033209

Trust: 1.6

db:SECTRACKid:1032655

Trust: 1.6

db:SECTRACKid:1032784

Trust: 1.6

db:SECTRACKid:1033991

Trust: 1.6

db:SECTRACKid:1033430

Trust: 1.6

db:SECTRACKid:1032778

Trust: 1.6

db:SECTRACKid:1032637

Trust: 1.6

db:SECTRACKid:1032884

Trust: 1.6

db:SECTRACKid:1033019

Trust: 1.6

db:SECTRACKid:1032960

Trust: 1.6

db:SECTRACKid:1032651

Trust: 1.6

db:SECTRACKid:1032783

Trust: 1.6

db:SECTRACKid:1032777

Trust: 1.6

db:SECTRACKid:1033760

Trust: 1.6

db:SECTRACKid:1032865

Trust: 1.6

db:SECTRACKid:1032727

Trust: 1.6

db:SECTRACKid:1033385

Trust: 1.6

db:SECTRACKid:1032474

Trust: 1.6

db:SECTRACKid:1033210

Trust: 1.6

db:SECTRACKid:1032652

Trust: 1.6

db:SECTRACKid:1032647

Trust: 1.6

db:SECTRACKid:1033433

Trust: 1.6

db:SECTRACKid:1033067

Trust: 1.6

db:SECTRACKid:1032910

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2015/05/20/8

Trust: 1.6

db:SIEMENSid:SSA-412672

Trust: 1.6

db:JUNIPERid:JSA10681

Trust: 1.6

db:JUNIPERid:JSA10727

Trust: 1.6

db:BIDid:91787

Trust: 1.6

db:BIDid:74733

Trust: 1.6

db:MCAFEEid:SB10122

Trust: 1.6

db:AUSCERTid:ESB-2022.0696

Trust: 0.6

db:AUSCERTid:ESB-2019.3475

Trust: 0.6

db:AUSCERTid:ESB-2023.1333

Trust: 0.6

db:CNNVDid:CNNVD-201505-428

Trust: 0.6

db:JUNIPERid:JSA10694

Trust: 0.3

db:BIDid:75652

Trust: 0.3

db:PACKETSTORMid:132652

Trust: 0.1

db:PACKETSTORMid:133344

Trust: 0.1

db:PACKETSTORMid:137744

Trust: 0.1

db:PACKETSTORMid:132398

Trust: 0.1

db:PACKETSTORMid:134902

Trust: 0.1

db:PACKETSTORMid:132757

Trust: 0.1

db:PACKETSTORMid:133338

Trust: 0.1

db:PACKETSTORMid:132803

Trust: 0.1

db:PACKETSTORMid:133324

Trust: 0.1

db:PACKETSTORMid:135506

Trust: 0.1

db:PACKETSTORMid:132894

Trust: 0.1

db:PACKETSTORMid:139114

Trust: 0.1

db:PACKETSTORMid:136247

Trust: 0.1

db:PACKETSTORMid:132989

Trust: 0.1

db:PACKETSTORMid:139116

Trust: 0.1

db:PACKETSTORMid:134232

Trust: 0.1

sources: BID: 75652 // PACKETSTORM: 132652 // PACKETSTORM: 133344 // PACKETSTORM: 137744 // PACKETSTORM: 132398 // PACKETSTORM: 134902 // PACKETSTORM: 132757 // PACKETSTORM: 133338 // PACKETSTORM: 132803 // PACKETSTORM: 133324 // PACKETSTORM: 135506 // PACKETSTORM: 132894 // PACKETSTORM: 139114 // PACKETSTORM: 136247 // PACKETSTORM: 132989 // PACKETSTORM: 139116 // PACKETSTORM: 134232 // CNNVD: CNNVD-201505-428 // NVD: CVE-2015-4000

REFERENCES

url:https://www.oracle.com/security-alerts/cpujan2021.html

Trust: 2.2

url:http://support.citrix.com/article/ctx201114

Trust: 2.2

url:http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

Trust: 1.9

url:http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html

Trust: 1.9

url:http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html

Trust: 1.9

url:https://security.gentoo.org/glsa/201506-02

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-2673-1

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2015-1486.html

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-2696-1

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-2706-1

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2016-2056.html

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2015-4000

Trust: 1.6

url:http://lists.opensuse.org/opensuse-updates/2016-02/msg00097.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032960

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959636

Trust: 1.6

url:http://www.securitytracker.com/id/1033019

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959517

Trust: 1.6

url:http://www.securitytracker.com/id/1032727

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144102017024820&w=2

Trust: 1.6

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04953655

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21959132

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21960191

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21961717

Trust: 1.6

url:http://lists.apple.com/archives/security-announce/2015/jun/msg00002.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1197.html

Trust: 1.6

url:http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html

Trust: 1.6

url:http://www.securitytracker.com/id/1033385

Trust: 1.6

url:http://www.securitytracker.com/id/1032856

Trust: 1.6

url:http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc

Trust: 1.6

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05128722

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html

Trust: 1.6

url:http://www.securityfocus.com/bid/91787

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html

Trust: 1.6

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-june/159351.html

Trust: 1.6

url:http://www.ubuntu.com/usn/usn-2656-2

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959530

Trust: 1.6

url:https://openssl.org/news/secadv/20150611.txt

Trust: 1.6

url:http://www.ubuntu.com/usn/usn-2656-1

Trust: 1.6

url:http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032702

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04772190

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143637549705650&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144060576831314&w=2

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1072.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1241.html

Trust: 1.6

url:https://weakdh.org/imperfect-forward-secrecy.pdf

Trust: 1.6

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10681

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21958984

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143506486712441&w=2

Trust: 1.6

url:https://developer.mozilla.org/en-us/docs/mozilla/projects/nss/nss_3.19.1_release_notes

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21960380

Trust: 1.6

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbhf03831en_us

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1185.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144043644216842&w=2

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959195

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144050121701297&w=2

Trust: 1.6

url:http://www.securityfocus.com/bid/74733

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html

Trust: 1.6

url:http://www.debian.org/security/2015/dsa-3300

Trust: 1.6

url:http://www.securitytracker.com/id/1033222

Trust: 1.6

url:http://www.securitytracker.com/id/1033341

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=145409266329539&w=2

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959325

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html

Trust: 1.6

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10122

Trust: 1.6

url:http://www.securitytracker.com/id/1032932

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143880121627664&w=2

Trust: 1.6

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05193083

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1488.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1229.html

Trust: 1.6

url:http://www.debian.org/security/2015/dsa-3316

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1242.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21962739

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04926789

Trust: 1.6

url:http://lists.opensuse.org/opensuse-updates/2015-07/msg00016.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959453

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html

Trust: 1.6

url:https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/

Trust: 1.6

url:http://www.securitytracker.com/id/1033433

Trust: 1.6

url:http://www.securitytracker.com/id/1034884

Trust: 1.6

url:http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959539

Trust: 1.6

url:https://security.gentoo.org/glsa/201603-11

Trust: 1.6

url:https://www.openssl.org/news/secadv_20150611.txt

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144104533800819&w=2

Trust: 1.6

url:http://openwall.com/lists/oss-security/2015/05/20/8

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21967893

Trust: 1.6

url:http://www.debian.org/security/2015/dsa-3324

Trust: 1.6

url:http://www.securitytracker.com/id/1032474

Trust: 1.6

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04876402

Trust: 1.6

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-june/160117.html

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144060606031437&w=2

Trust: 1.6

url:http://www.securitytracker.com/id/1032476

Trust: 1.6

url:http://www.securitytracker.com/id/1032475

Trust: 1.6

url:http://www.securitytracker.com/id/1033208

Trust: 1.6

url:http://www.securitytracker.com/id/1032910

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04923929

Trust: 1.6

url:http://www.securitytracker.com/id/1033209

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1243.html

Trust: 1.6

url:https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04718196

Trust: 1.6

url:https://security.gentoo.org/glsa/201701-46

Trust: 1.6

url:http://www.debian.org/security/2015/dsa-3339

Trust: 1.6

url:http://www.securitytracker.com/id/1033210

Trust: 1.6

url:http://www.securitytracker.com/id/1033416

Trust: 1.6

url:http://www.securitytracker.com/id/1032688

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21962816

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144061542602287&w=2

Trust: 1.6

url:http://lists.apple.com/archives/security-announce/2015/jun/msg00001.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959481

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04770140

Trust: 1.6

url:https://support.citrix.com/article/ctx216642

Trust: 1.6

url:http://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2015-008.txt.asc

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1485.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032699

Trust: 1.6

url:http://www.mozilla.org/security/announce/2015/mfsa2015-70.html

Trust: 1.6

url:http://www.solarwinds.com/documentation/storage/storagemanager/docs/releasenotes/releasenotes.htm

Trust: 1.6

url:http://support.apple.com/kb/ht204941

Trust: 1.6

url:http://support.apple.com/kb/ht204942

Trust: 1.6

url:http://www.securitytracker.com/id/1040630

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1604.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html

Trust: 1.6

url:https://bto.bluecoat.com/security-advisory/sa98

Trust: 1.6

url:http://www.securitytracker.com/id/1033430

Trust: 1.6

url:http://www.securitytracker.com/id/1034087

Trust: 1.6

url:http://lists.opensuse.org/opensuse-updates/2016-02/msg00094.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032784

Trust: 1.6

url:https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf

Trust: 1.6

url:http://www.securitytracker.com/id/1032783

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html

Trust: 1.6

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10727

Trust: 1.6

url:http://www.securitytracker.com/id/1033513

Trust: 1.6

url:http://www.securitytracker.com/id/1034728

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21960418

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04918839

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html

Trust: 1.6

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-june/159314.html

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144493176821532&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143628304012255&w=2

Trust: 1.6

url:http://www.securitytracker.com/id/1033760

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html

Trust: 1.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21959745

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143655800220052&w=2

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959111

Trust: 1.6

url:http://www.securitytracker.com/id/1033891

Trust: 1.6

url:https://www.suse.com/security/cve/cve-2015-4000.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1228.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032884

Trust: 1.6

url:http://www.debian.org/security/2016/dsa-3688

Trust: 1.6

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04740527

Trust: 1.6

url:https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/

Trust: 1.6

url:http://www.securitytracker.com/id/1032647

Trust: 1.6

url:http://www.securitytracker.com/id/1032645

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1230.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032649

Trust: 1.6

url:http://www.securitytracker.com/id/1032648

Trust: 1.6

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098403

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143557934009303&w=2

Trust: 1.6

url:http://www.securitytracker.com/id/1033064

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1544.html

Trust: 1.6

url:http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032650

Trust: 1.6

url:http://www.securitytracker.com/id/1033067

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21960041

Trust: 1.6

url:https://security.gentoo.org/glsa/201512-10

Trust: 1.6

url:https://puppet.com/security/cve/cve-2015-4000

Trust: 1.6

url:http://www.securitytracker.com/id/1033065

Trust: 1.6

url:http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032654

Trust: 1.6

url:http://www.securitytracker.com/id/1032653

Trust: 1.6

url:http://www.securitytracker.com/id/1032652

Trust: 1.6

url:http://www.securitytracker.com/id/1032651

Trust: 1.6

url:http://www.securitytracker.com/id/1032778

Trust: 1.6

url:http://www.securitytracker.com/id/1032656

Trust: 1.6

url:http://www.securitytracker.com/id/1032777

Trust: 1.6

url:http://www.securitytracker.com/id/1036218

Trust: 1.6

url:http://www.securitytracker.com/id/1032655

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21962455

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2016-1624.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04832246

Trust: 1.6

url:http://www.securitytracker.com/id/1033991

Trust: 1.6

url:https://security.netapp.com/advisory/ntap-20150619-0001/

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144069189622016&w=2

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959812

Trust: 1.6

url:http://www.securitytracker.com/id/1032865

Trust: 1.6

url:http://www.securitytracker.com/id/1032864

Trust: 1.6

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05045763

Trust: 1.6

url:http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html

Trust: 1.6

url:https://bugzilla.mozilla.org/show_bug.cgi?id=1138554

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773119

Trust: 1.6

url:http://www.debian.org/security/2015/dsa-3287

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143558092609708&w=2

Trust: 1.6

url:http://www.securitytracker.com/id/1032871

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html

Trust: 1.6

url:https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes

Trust: 1.6

url:http://www.securitytracker.com/id/1032759

Trust: 1.6

url:http://www.securitytracker.com/id/1032637

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html

Trust: 1.6

url:http://www.fortiguard.com/advisory/2015-05-20-logjam-attack

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1526.html

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21960194

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773241

Trust: 1.6

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04949778

Trust: 1.6

url:https://weakdh.org/

Trust: 1.0

url:https://www.auscert.org.au/bulletins/esb-2022.0696

Trust: 0.6

url:https://www.ibm.com/support/docview.wss?uid=ibm11073000

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1333

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-spectrum-protect-backup-archive-client-web-user-interface-ibm-spectrum-protect-for-space-management-and-ibm-spectrum-protect-for-virtual-environments-are-vulnerabile-to-logjam/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-spectrum-protect-plus-vulnerable-to-logjam-cve-2015-4000/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.3475/

Trust: 0.6

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.5

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.5

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.4

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.4

url:https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea

Trust: 0.4

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n

Trust: 0.4

url:https://mta.openssl.org/pipermail/openssl-announce/2015-july/000037.html

Trust: 0.3

url:http://openssl.org/

Trust: 0.3

url:https://support.asperasoft.com/entries/94843988-security-bulletin-openssl-,-tls-vulnerabilities-logjam-cve-2015-4000

Trust: 0.3

url:http://seclists.org/bugtraq/2015/aug/13

Trust: 0.3

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10694

Trust: 0.3

url:https://www.openssl.org/news/secadv_20150709.txt

Trust: 0.3

url:http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html

Trust: 0.3

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04822825

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05184351

Trust: 0.3

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150710-openssl

Trust: 0.3

url:http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-454058.htm

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21962519

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21964231

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21965399

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=nas8n1020840

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21961179

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21962398

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21962929

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21963448

Trust: 0.3

url:https://www.openssl.org/news/vulnerabilities.html#2015-1793

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21963498

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21966481

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21966484

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21965725

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21965807

Trust: 0.3

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-2808

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-4732

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-4760

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-2601

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2015-4000

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-2632

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-2621

Trust: 0.3

url:https://access.redhat.com/security/team/contact/

Trust: 0.3

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.3

url:https://bugzilla.redhat.com/):

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-2625

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-2590

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-4733

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-4749

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-4731

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-4748

Trust: 0.3

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2628

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2613

Trust: 0.2

url:https://access.redhat.com/articles/2688611

Trust: 0.2

url:https://access.redhat.com/solutions/222023

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-2109

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-2106

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2016-2109

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-4459

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3195

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3183

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2016-2106

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2016-2105

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2016-3110

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2016-4459

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-2108

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-3195

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-3183

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-2105

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-3110

Trust: 0.2

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=appplatform&downloadtype=securitypatches&version=6.4

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2016-2108

Trust: 0.2

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.1

url:https://softwaresupport.hp.com/group/softwaresupport/search-result/-/fa

Trust: 0.1

url:https://softwaresupport.hpe.com/km/km02236843

Trust: 0.1

url:https://softwaresupport.hpe.com/km/km02236813

Trust: 0.1

url:https://softwaresupport.hpe.com/km/km02143530

Trust: 0.1

url:https://softwaresupport.hpe.com/km/km02311066>

Trust: 0.1

url:https://softwaresupport.hpe.com/km/km02143589

Trust: 0.1

url:https://softwaresupport.hpe.com/km/km02143332

Trust: 0.1

url:https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facetse

Trust: 0.1

url:https://softwaresupport.hpe.com/km/km02310486

Trust: 0.1

url:https://softwaresupport.hpe.com/km/km02236827

Trust: 0.1

url:https://softwaresupport.hpe.com/km/km02310566

Trust: 0.1

url:https://softwaresupport.hpe.com/km/km02310304

Trust: 0.1

url:https://softwaresupport.hpe.com/km/km02143206

Trust: 0.1

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay/?doci

Trust: 0.1

url:https://softwaresupport.hpe.com/km/km02143388

Trust: 0.1

url:https://softwaresupport.hpe.com/km/km02236897

Trust: 0.1

url:https://softwaresupport.hpe.com/km/km02143276

Trust: 0.1

url:https://softwaresupport.hpe.com/km/km02311656

Trust: 0.1

url:https://softwaresupport.hpe.com/km/km02236929

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1792

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1788

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1790

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1792

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1791

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1790

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1789

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4000

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1788

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1791

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-8176

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-8176

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1789

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2734

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2735

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2736

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/thunderbird/1:31.8.0+build1-0ubuntu0.15.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2737

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2739

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2740

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2738

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2724

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/thunderbird/1:31.8.0+build1-0ubuntu0.14.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/thunderbird/1:31.8.0+build1-0ubuntu0.12.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2721

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/thunderbird/1:31.8.0+build1-0ubuntu0.14.10.1

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4760

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2621

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2601

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4732

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2632

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2664

Trust: 0.1

url:https://www.ibm.com/developerworks/java/jdk/alerts/

Trust: 0.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-1931

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4733

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2638

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4748

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4731

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2625

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2638

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4749

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1931

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2664

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2590

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2637

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2637

Trust: 0.1

url:https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facets

Trust: 0.1

url:https://www.hp.com/go/ilo

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-7/7u79-2.5.6-0ubuntu1.14.04.1

Trust: 0.1

url:https://wiki.ubuntu.com/securityteam/knowledgebase/logjam

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-7/7u79-2.5.6-0ubuntu1.15.04.1

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2016-2054.html

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/jboss_enterprise_application_platform/6.4/index.html

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-6/6b36-1.13.8-0ubuntu1~12.04

Trust: 0.1

url:https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/

Trust: 0.1

sources: BID: 75652 // PACKETSTORM: 132652 // PACKETSTORM: 133344 // PACKETSTORM: 137744 // PACKETSTORM: 132398 // PACKETSTORM: 134902 // PACKETSTORM: 132757 // PACKETSTORM: 133338 // PACKETSTORM: 132803 // PACKETSTORM: 133324 // PACKETSTORM: 135506 // PACKETSTORM: 132894 // PACKETSTORM: 139114 // PACKETSTORM: 136247 // PACKETSTORM: 132989 // PACKETSTORM: 139116 // PACKETSTORM: 134232 // CNNVD: CNNVD-201505-428 // NVD: CVE-2015-4000

CREDITS

HP

Trust: 0.9

sources: PACKETSTORM: 132652 // PACKETSTORM: 133344 // PACKETSTORM: 137744 // PACKETSTORM: 134902 // PACKETSTORM: 133338 // PACKETSTORM: 133324 // PACKETSTORM: 135506 // PACKETSTORM: 136247 // PACKETSTORM: 134232

SOURCES

db:BIDid:75652
db:PACKETSTORMid:132652
db:PACKETSTORMid:133344
db:PACKETSTORMid:137744
db:PACKETSTORMid:132398
db:PACKETSTORMid:134902
db:PACKETSTORMid:132757
db:PACKETSTORMid:133338
db:PACKETSTORMid:132803
db:PACKETSTORMid:133324
db:PACKETSTORMid:135506
db:PACKETSTORMid:132894
db:PACKETSTORMid:139114
db:PACKETSTORMid:136247
db:PACKETSTORMid:132989
db:PACKETSTORMid:139116
db:PACKETSTORMid:134232
db:CNNVDid:CNNVD-201505-428
db:NVDid:CVE-2015-4000

LAST UPDATE DATE

2026-02-07T21:44:15.203000+00:00


SOURCES UPDATE DATE

db:BIDid:75652date:2016-10-26T05:10:00
db:CNNVDid:CNNVD-201505-428date:2023-03-03T00:00:00
db:NVDid:CVE-2015-4000date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:BIDid:75652date:2015-07-09T00:00:00
db:PACKETSTORMid:132652date:2015-07-13T04:32:11
db:PACKETSTORMid:133344date:2015-08-27T13:19:00
db:PACKETSTORMid:137744date:2016-07-01T13:13:00
db:PACKETSTORMid:132398date:2015-06-22T14:14:00
db:PACKETSTORMid:134902date:2015-12-17T06:44:54
db:PACKETSTORMid:132757date:2015-07-20T22:55:34
db:PACKETSTORMid:133338date:2015-08-26T23:42:39
db:PACKETSTORMid:132803date:2015-07-22T22:38:54
db:PACKETSTORMid:133324date:2015-08-26T01:35:03
db:PACKETSTORMid:135506date:2016-01-29T20:31:00
db:PACKETSTORMid:132894date:2015-08-03T01:14:40
db:PACKETSTORMid:139114date:2016-10-12T20:16:45
db:PACKETSTORMid:136247date:2016-03-15T13:13:00
db:PACKETSTORMid:132989date:2015-08-07T04:04:00
db:PACKETSTORMid:139116date:2016-10-12T23:44:55
db:PACKETSTORMid:134232date:2015-11-05T14:17:07
db:CNNVDid:CNNVD-201505-428date:2015-05-21T00:00:00
db:NVDid:CVE-2015-4000date:2015-05-21T00:59:00.087