ID

VAR-201505-0233


CVE

CVE-2015-4000


TITLE

HP Security Bulletin HPSBGN03402 2

Trust: 0.1

sources: PACKETSTORM: 133344

DESCRIPTION

The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue. There is a security vulnerability in the TLS protocol 1.2 and earlier versions. The vulnerability comes from that when the server enables the DHE_EXPORT cipher suite, the program does not pass the DHE_EXPORT option correctly. Attackers can exploit this vulnerability to implement man-in-the-middle attacks and cipher-downgrade attacks by rewriting ClientHello (use DHE_EXPORT instead of DHE) and then rewrite ServerHello (use DHE instead of DHE_EXPORT). -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04772190 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04772190 Version: 2 HPSBGN03402 rev.2 - HP Performance Manager, Remote Disclosure of Information NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2015-08-26 Last Updated: 2015-08-26 Potential Security Impact: Remote disclosure of information Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified in HP Performance Manager. - The TLS vulnerability using US export-grade 512-bit keys in Diffie-Hellman key exchange known as "Logjam" could be exploited remotely to allow unauthorized modification. - The RC4 stream cipher vulnerability in SSL/TLS known as "Bar Mitzvah" could be exploited remotely to allow disclosure of information. References: CVE-2015-4000 - "Logjam" CVE-2015-2808 - "Bar Mitzvah" SSRT102204, SSRT102208 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Performance Manager v9.0x and v9.20. BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2015-2808 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2015-4000 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has made the following mitigation information and software updates available to resolve the vulnerabilities for the impacted versions of HP Performance Manager. Please consult HP Software Support Online (SSO): CVE-2015-4000 - "Logjam" https://softwaresupport.hp.com/group/softwaresupport/search-result/-/fa cetsearch/document/KM01766982 CVE-2015-2808 - "Bar Mitzvah" https://softwaresupport.hp.com/group/softwaresupport/search-result/-/fa cetsearch/document/KM01766997?lang=en&cc=us&hpappid=113963_OSP_PRO_HPE HISTORY Version:1 (rev.1) - 26 August 2015 Initial release Version:2 (rev.2) - 26 August 2015 Added missing CVSS entry for CVE-2015-4000 Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201701-46 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Mozilla Network Security Service (NSS): Multiple vulnerabilities Date: January 19, 2017 Bugs: #550288, #571086, #604916 ID: 201701-46 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in NSS, the worst of which could allow remote attackers to obtain access to private key information. Background ========== The Mozilla Network Security Service (NSS) is a library implementing security features like SSL v.2/v.3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME and X.509 certificates. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-libs/nss < 3.28 >= 3.28 Description =========== Multiple vulnerabilities have been discovered in NSS. Please review the CVE identifiers and technical papers referenced below for details. Impact ====== Remote attackers could conduct man-in-the-middle attacks, obtain access to private key information, or cause a Denial of Service condition. Workaround ========== There is no known workaround at this time. Resolution ========== All NSS users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/nss-3.28" References ========== [ 1 ] CVE-2015-2721 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2721 [ 2 ] CVE-2015-4000 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000 [ 3 ] CVE-2015-7575 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7575 [ 4 ] CVE-2016-1938 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1938 [ 5 ] CVE-2016-5285 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5285 [ 6 ] CVE-2016-8635 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8635 [ 7 ] CVE-2016-9074 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9074 [ 8 ] SLOTH Attack Technical Paper http://www.mitls.org/pages/attacks/SLOTH Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201701-46 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2017 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 --IaUA2rjNRE1qkoRse7wxSpqjKrtacOEtO-- . CVE-2015-4000 David Adrian et al. reported that it may be feasible to attack Diffie-Hellman-based cipher suites in certain circumstances, compromising the confidentiality and integrity of data encrypted with Transport Layer Security (TLS). CVE-2015-7181 CVE-2015-7182 CVE-2016-1950 Tyson Smith, David Keeler, and Francis Gabriel discovered heap-based buffer overflows in the ASN.1 DER parser, potentially leading to arbitrary code execution. CVE-2015-7575 Karthikeyan Bhargavan discovered that TLS client implementation accepted MD5-based signatures for TLS 1.2 connections with forward secrecy, weakening the intended security strength of TLS connections. CVE-2016-1938 Hanno Boeck discovered that NSS miscomputed the result of integer division for certain inputs. This could weaken the cryptographic protections provided by NSS. However, NSS implements RSA-CRT leak hardening, so RSA private keys are not directly disclosed by this issue. CVE-2016-1978 Eric Rescorla discovered a user-after-free vulnerability in the implementation of ECDH-based TLS handshakes, with unknown consequences. CVE-2016-1979 Tim Taubert discovered a use-after-free vulnerability in ASN.1 DER processing, with application-specific impact. CVE-2016-2834 Tyson Smith and Jed Davis discovered unspecified memory-safety bugs in NSS. In addition, the NSS library did not ignore environment variables in processes which underwent a SUID/SGID/AT_SECURE transition at process start. In certain system configurations, this allowed local users to escalate their privileges. For the stable distribution (jessie), these problems have been fixed in version 2:3.26-1+debu8u1. For the unstable distribution (sid), these problems have been fixed in version 2:3.23-1. We recommend that you upgrade your nss packages. HP Operations Agent Virtual Appliance v11.11, v11.12, v11.13, v11.14. HP Service Health Reporter v9.20, v9.30, v9.31, v9.32, and v9.40. Description: Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. This release includes bug fixes and enhancements, as well as a new release of OpenSSL that addresses a number of outstanding security flaws. For further information, see the knowledge base article linked to in the References section. Security Fix(es): * A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library. (CVE-2016-2108) * Multiple flaws were found in the way httpd parsed HTTP requests and responses using chunked transfer encoding. A remote attacker could use these flaws to create a specially crafted request, which httpd would decode differently from an HTTP proxy software in front of it, possibly leading to HTTP request smuggling attacks. (CVE-2015-3183) * A memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and CMS data. A remote attacker could use this flaw to cause an application that parses PKCS#7 or CMS data from untrusted sources to use an excessive amount of memory and possibly crash. (CVE-2015-4000) * An integer overflow flaw, leading to a buffer overflow, was found in the way the EVP_EncodeUpdate() function of OpenSSL parsed very large amounts of input data. A remote attacker could use this flaw to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application. (CVE-2016-2105) * An integer overflow flaw, leading to a buffer overflow, was found in the way the EVP_EncryptUpdate() function of OpenSSL parsed very large amounts of input data. A remote attacker could use this flaw to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application. (CVE-2016-2106) * It was discovered that it is possible to remotely Segfault Apache http server with a specially crafted string sent to the mod_cluster via service messages (MCMP). (CVE-2016-3110) * A denial of service flaw was found in the way OpenSSL parsed certain ASN.1-encoded data from BIO (OpenSSL's I/O abstraction) inputs. An application using OpenSSL that accepts untrusted ASN.1 BIO input could be forced to allocate an excessive amount of data. (CVE-2016-2109) * It was discovered that specifying configuration with a JVMRoute path longer than 80 characters will cause segmentation fault leading to a server crash. (CVE-2016-4459) Red Hat would like to thank the OpenSSL project for reporting CVE-2016-2108, CVE-2016-2105, and CVE-2016-2106 and Michal Karm Babacek for reporting CVE-2016-3110. Upstream acknowledges Huzaifa Sidhpurwala (Red Hat), Hanno BAPck, and David Benjamin (Google) as the original reporters of CVE-2016-2108; and Guido Vranken as the original reporter of CVE-2016-2105 and CVE-2016-2106. Bugs fixed (https://bugzilla.redhat.com/): 1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks 1243887 - CVE-2015-3183 httpd: HTTP request smuggling attack against chunked request parser 1288322 - CVE-2015-3195 OpenSSL: X509_ATTRIBUTE memory leak 1326320 - CVE-2016-3110 mod_cluster: remotely Segfault Apache http server 1330101 - CVE-2016-2109 openssl: ASN.1 BIO handling of large amounts of data 1331402 - CVE-2016-2108 openssl: Memory corruption in the ASN.1 encoder 1331441 - CVE-2016-2105 openssl: EVP_EncodeUpdate overflow 1331536 - CVE-2016-2106 openssl: EVP_EncryptUpdate overflow 1341583 - CVE-2016-4459 mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute 1345989 - RHEL7 RPMs: Upgrade mod_cluster-native to 1.2.13.Final-redhat-1 1345993 - RHEL7 RPMs: Upgrade mod_jk to 1.2.41.redhat-1 1345997 - RHEL7 RPMs: Upgrade tomcat-native to 1.1.34 6. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: java-1.7.0-openjdk security update Advisory ID: RHSA-2015:1230-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1230.html Issue date: 2015-07-15 CVE Names: CVE-2015-2590 CVE-2015-2601 CVE-2015-2621 CVE-2015-2625 CVE-2015-2628 CVE-2015-2632 CVE-2015-2808 CVE-2015-4000 CVE-2015-4731 CVE-2015-4732 CVE-2015-4733 CVE-2015-4748 CVE-2015-4749 CVE-2015-4760 ===================================================================== 1. Summary: Updated java-1.7.0-openjdk packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 3. Description: The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. Multiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2015-4760, CVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733) A flaw was found in the way the Libraries component of OpenJDK verified Online Certificate Status Protocol (OCSP) responses. An OCSP response with no nextUpdate date specified was incorrectly handled as having unlimited validity, possibly causing a revoked X.509 certificate to be interpreted as valid. (CVE-2015-4748) It was discovered that the JCE component in OpenJDK failed to use constant time comparisons in multiple cases. An attacker could possibly use these flaws to disclose sensitive information by measuring the time used to perform operations using these non-constant time comparisons. (CVE-2015-2601) A flaw was found in the RC4 encryption algorithm. When using certain keys for RC4 encryption, an attacker could obtain portions of the plain text from the cipher text without the knowledge of the encryption key. (CVE-2015-2808) Note: With this update, OpenJDK now disables RC4 SSL/TLS cipher suites by default to address the CVE-2015-2808 issue. Refer to Red Hat Bugzilla bug 1207101, linked to in the References section, for additional details about this change. A flaw was found in the way the TLS protocol composed the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. (CVE-2015-4000) Note: This update forces the TLS/SSL client implementation in OpenJDK to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Refer to Red Hat Bugzilla bug 1223211, linked to in the References section, for additional details about this change. It was discovered that the JNDI component in OpenJDK did not handle DNS resolutions correctly. An attacker able to trigger such DNS errors could cause a Java application using JNDI to consume memory and CPU time, and possibly block further DNS resolution. (CVE-2015-4749) Multiple information leak flaws were found in the JMX and 2D components in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-2621, CVE-2015-2632) A flaw was found in the way the JSSE component in OpenJDK performed X.509 certificate identity verification when establishing a TLS/SSL connection to a host identified by an IP address. In certain cases, the certificate was accepted as valid if it was issued for a host name to which the IP address resolves rather than for the IP address. (CVE-2015-2625) All users of java-1.7.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1207101 - CVE-2015-2808 SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher 1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks 1241965 - CVE-2015-2625 OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) 1242019 - CVE-2015-2601 OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) 1242232 - CVE-2015-2628 OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376) 1242234 - CVE-2015-4731 OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) 1242240 - CVE-2015-4732 OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) 1242275 - CVE-2015-4733 OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) 1242281 - CVE-2015-4748 OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) 1242372 - CVE-2015-2621 OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) 1242379 - CVE-2015-4749 OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) 1242394 - CVE-2015-2632 ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) 1242447 - CVE-2015-4760 ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715) 1243139 - CVE-2015-2590 OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.src.rpm i386: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el5_11.i386.rpm x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.src.rpm i386: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el5_11.i386.rpm x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-2590 https://access.redhat.com/security/cve/CVE-2015-2601 https://access.redhat.com/security/cve/CVE-2015-2621 https://access.redhat.com/security/cve/CVE-2015-2625 https://access.redhat.com/security/cve/CVE-2015-2628 https://access.redhat.com/security/cve/CVE-2015-2632 https://access.redhat.com/security/cve/CVE-2015-2808 https://access.redhat.com/security/cve/CVE-2015-4000 https://access.redhat.com/security/cve/CVE-2015-4731 https://access.redhat.com/security/cve/CVE-2015-4732 https://access.redhat.com/security/cve/CVE-2015-4733 https://access.redhat.com/security/cve/CVE-2015-4748 https://access.redhat.com/security/cve/CVE-2015-4749 https://access.redhat.com/security/cve/CVE-2015-4760 https://access.redhat.com/security/updates/classification/#important https://bugzilla.redhat.com/show_bug.cgi?id=1207101#c11 https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVpljRXlSAg2UNWIIRAl93AJ0bTWDExJ3gT6Vf3jj7gLWm1931JQCfSHwy geoA6gBwA56Ep9ZcHnUCxAU= =qQgk -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Note: This vulnerability is in the TLS protocol and not specific to HP Project and Portfolio Management Center

Trust: 1.71

sources: NVD: CVE-2015-4000 // VULHUB: VHN-81961 // PACKETSTORM: 133344 // PACKETSTORM: 140618 // PACKETSTORM: 139002 // PACKETSTORM: 133338 // PACKETSTORM: 133324 // PACKETSTORM: 139114 // PACKETSTORM: 132698 // PACKETSTORM: 134232

AFFECTED PRODUCTS

vendor:oraclemodel:jrockitscope:eqversion:r28.3.6

Trust: 1.0

vendor:mozillamodel:firefox esrscope:eqversion:31.8

Trust: 1.0

vendor:oraclemodel:sparc-opl service processorscope:lteversion:1121

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.6.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.10

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:hpmodel:hp-uxscope:eqversion:b.11.31

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:31.8

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:12

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.0.2

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:39.0

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.19

Trust: 1.0

vendor:applemodel:iphone osscope:lteversion:8.3

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.35

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:38.1.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:15.04

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.8.0

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.7.0

Trust: 1.0

vendor:mozillamodel:firefox osscope:eqversion:2.2

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.6.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.8.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion: -

Trust: 1.0

vendor:opensslmodel:opensslscope:lteversion:1.0.2a

Trust: 1.0

vendor:applemodel:mac os xscope:lteversion:10.10.3

Trust: 1.0

vendor:opensslmodel:opensslscope:lteversion:1.0.1m

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.7.0

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:38.1

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.0.1

Trust: 1.0

vendor:microsoftmodel:internet explorerscope:eqversion: -

Trust: 1.0

vendor:googlemodel:chromescope:eqversion: -

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion: -

Trust: 1.0

vendor:ibmmodel:content managerscope:eqversion:8.5

Trust: 1.0

vendor:susemodel:linux enterprise software development kitscope:eqversion:12

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:11.0

Trust: 1.0

vendor:operamodel:browserscope:eqversion: -

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:12

Trust: 1.0

sources: NVD: CVE-2015-4000

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-4000
value: LOW

Trust: 1.0

VULHUB: VHN-81961
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-4000
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-81961
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-4000
baseSeverity: LOW
baseScore: 3.7
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 1.4
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-81961 // NVD: CVE-2015-4000

PROBLEMTYPE DATA

problemtype:CWE-310

Trust: 1.1

sources: VULHUB: VHN-81961 // NVD: CVE-2015-4000

THREAT TYPE

remote

Trust: 0.1

sources: PACKETSTORM: 140618

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-81961

EXTERNAL IDS

db:NVDid:CVE-2015-4000

Trust: 1.9

db:SECTRACKid:1032864

Trust: 1.1

db:SECTRACKid:1033341

Trust: 1.1

db:SECTRACKid:1032777

Trust: 1.1

db:SECTRACKid:1032727

Trust: 1.1

db:SECTRACKid:1032871

Trust: 1.1

db:SECTRACKid:1032475

Trust: 1.1

db:SECTRACKid:1032783

Trust: 1.1

db:SECTRACKid:1032653

Trust: 1.1

db:SECTRACKid:1032702

Trust: 1.1

db:SECTRACKid:1033222

Trust: 1.1

db:SECTRACKid:1032865

Trust: 1.1

db:SECTRACKid:1033065

Trust: 1.1

db:SECTRACKid:1033208

Trust: 1.1

db:SECTRACKid:1033019

Trust: 1.1

db:SECTRACKid:1033991

Trust: 1.1

db:SECTRACKid:1032759

Trust: 1.1

db:SECTRACKid:1040630

Trust: 1.1

db:SECTRACKid:1032910

Trust: 1.1

db:SECTRACKid:1033067

Trust: 1.1

db:SECTRACKid:1032637

Trust: 1.1

db:SECTRACKid:1033064

Trust: 1.1

db:SECTRACKid:1032654

Trust: 1.1

db:SECTRACKid:1032656

Trust: 1.1

db:SECTRACKid:1034087

Trust: 1.1

db:SECTRACKid:1032932

Trust: 1.1

db:SECTRACKid:1033385

Trust: 1.1

db:SECTRACKid:1032652

Trust: 1.1

db:SECTRACKid:1032688

Trust: 1.1

db:SECTRACKid:1032699

Trust: 1.1

db:SECTRACKid:1032649

Trust: 1.1

db:SECTRACKid:1032960

Trust: 1.1

db:SECTRACKid:1032647

Trust: 1.1

db:SECTRACKid:1032474

Trust: 1.1

db:SECTRACKid:1033210

Trust: 1.1

db:SECTRACKid:1032778

Trust: 1.1

db:SECTRACKid:1033416

Trust: 1.1

db:SECTRACKid:1033891

Trust: 1.1

db:SECTRACKid:1032884

Trust: 1.1

db:SECTRACKid:1032651

Trust: 1.1

db:SECTRACKid:1033760

Trust: 1.1

db:SECTRACKid:1033433

Trust: 1.1

db:SECTRACKid:1032476

Trust: 1.1

db:SECTRACKid:1032784

Trust: 1.1

db:SECTRACKid:1036218

Trust: 1.1

db:SECTRACKid:1032856

Trust: 1.1

db:SECTRACKid:1033430

Trust: 1.1

db:SECTRACKid:1034884

Trust: 1.1

db:SECTRACKid:1032655

Trust: 1.1

db:SECTRACKid:1032650

Trust: 1.1

db:SECTRACKid:1032648

Trust: 1.1

db:SECTRACKid:1033513

Trust: 1.1

db:SECTRACKid:1033209

Trust: 1.1

db:SECTRACKid:1032645

Trust: 1.1

db:SECTRACKid:1034728

Trust: 1.1

db:JUNIPERid:JSA10681

Trust: 1.1

db:JUNIPERid:JSA10727

Trust: 1.1

db:BIDid:91787

Trust: 1.1

db:BIDid:74733

Trust: 1.1

db:MCAFEEid:SB10122

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2015/05/20/8

Trust: 1.1

db:SIEMENSid:SSA-412672

Trust: 1.1

db:PACKETSTORMid:139002

Trust: 0.2

db:PACKETSTORMid:133338

Trust: 0.2

db:PACKETSTORMid:134232

Trust: 0.2

db:PACKETSTORMid:133324

Trust: 0.2

db:PACKETSTORMid:132413

Trust: 0.1

db:PACKETSTORMid:132649

Trust: 0.1

db:PACKETSTORMid:132586

Trust: 0.1

db:PACKETSTORMid:132164

Trust: 0.1

db:PACKETSTORMid:132610

Trust: 0.1

db:PACKETSTORMid:135506

Trust: 0.1

db:PACKETSTORMid:136247

Trust: 0.1

db:PACKETSTORMid:137744

Trust: 0.1

db:PACKETSTORMid:132439

Trust: 0.1

db:PACKETSTORMid:132652

Trust: 0.1

db:PACKETSTORMid:135510

Trust: 0.1

db:PACKETSTORMid:132465

Trust: 0.1

db:PACKETSTORMid:132468

Trust: 0.1

db:PACKETSTORMid:134902

Trust: 0.1

db:PACKETSTORMid:136975

Trust: 0.1

db:PACKETSTORMid:134755

Trust: 0.1

db:CNNVDid:CNNVD-201505-428

Trust: 0.1

db:VULHUBid:VHN-81961

Trust: 0.1

db:PACKETSTORMid:133344

Trust: 0.1

db:PACKETSTORMid:140618

Trust: 0.1

db:PACKETSTORMid:139114

Trust: 0.1

db:PACKETSTORMid:132698

Trust: 0.1

sources: VULHUB: VHN-81961 // PACKETSTORM: 133344 // PACKETSTORM: 140618 // PACKETSTORM: 139002 // PACKETSTORM: 133338 // PACKETSTORM: 133324 // PACKETSTORM: 139114 // PACKETSTORM: 132698 // PACKETSTORM: 134232 // NVD: CVE-2015-4000

REFERENCES

url:https://security.gentoo.org/glsa/201701-46

Trust: 1.2

url:http://rhn.redhat.com/errata/rhsa-2015-1230.html

Trust: 1.2

url:http://lists.apple.com/archives/security-announce/2015/jun/msg00001.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2015/jun/msg00002.html

Trust: 1.1

url:http://www.securityfocus.com/bid/74733

Trust: 1.1

url:http://www.securityfocus.com/bid/91787

Trust: 1.1

url:https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf

Trust: 1.1

url:http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc

Trust: 1.1

url:http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery

Trust: 1.1

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04876402

Trust: 1.1

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04949778

Trust: 1.1

url:http://support.apple.com/kb/ht204941

Trust: 1.1

url:http://support.apple.com/kb/ht204942

Trust: 1.1

url:http://support.citrix.com/article/ctx201114

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959111

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959195

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959325

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959453

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959481

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959517

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959530

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959539

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959636

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959812

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21960191

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21961717

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21962455

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21962739

Trust: 1.1

url:http://www-304.ibm.com/support/docview.wss?uid=swg21958984

Trust: 1.1

url:http://www-304.ibm.com/support/docview.wss?uid=swg21959132

Trust: 1.1

url:http://www-304.ibm.com/support/docview.wss?uid=swg21960041

Trust: 1.1

url:http://www-304.ibm.com/support/docview.wss?uid=swg21960194

Trust: 1.1

url:http://www-304.ibm.com/support/docview.wss?uid=swg21960380

Trust: 1.1

url:http://www-304.ibm.com/support/docview.wss?uid=swg21960418

Trust: 1.1

url:http://www-304.ibm.com/support/docview.wss?uid=swg21962816

Trust: 1.1

url:http://www-304.ibm.com/support/docview.wss?uid=swg21967893

Trust: 1.1

url:http://www.fortiguard.com/advisory/2015-05-20-logjam-attack

Trust: 1.1

url:http://www.mozilla.org/security/announce/2015/mfsa2015-70.html

Trust: 1.1

url:http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html

Trust: 1.1

url:http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

Trust: 1.1

url:http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html

Trust: 1.1

url:http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html

Trust: 1.1

url:http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html

Trust: 1.1

url:http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html

Trust: 1.1

url:http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html

Trust: 1.1

url:http://www.solarwinds.com/documentation/storage/storagemanager/docs/releasenotes/releasenotes.htm

Trust: 1.1

url:https://bto.bluecoat.com/security-advisory/sa98

Trust: 1.1

url:https://bugzilla.mozilla.org/show_bug.cgi?id=1138554

Trust: 1.1

url:https://developer.mozilla.org/en-us/docs/mozilla/projects/nss/nss_3.19.1_release_notes

Trust: 1.1

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04770140

Trust: 1.1

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04772190

Trust: 1.1

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773119

Trust: 1.1

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773241

Trust: 1.1

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04832246

Trust: 1.1

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04918839

Trust: 1.1

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04923929

Trust: 1.1

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04926789

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04740527

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04953655

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05045763

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05128722

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05193083

Trust: 1.1

url:https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes

Trust: 1.1

url:https://openssl.org/news/secadv/20150611.txt

Trust: 1.1

url:https://puppet.com/security/cve/cve-2015-4000

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20150619-0001/

Trust: 1.1

url:https://support.citrix.com/article/ctx216642

Trust: 1.1

url:https://www-304.ibm.com/support/docview.wss?uid=swg21959745

Trust: 1.1

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098403

Trust: 1.1

url:https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/

Trust: 1.1

url:https://www.openssl.org/news/secadv_20150611.txt

Trust: 1.1

url:https://www.suse.com/security/cve/cve-2015-4000.html

Trust: 1.1

url:http://www.debian.org/security/2015/dsa-3287

Trust: 1.1

url:http://www.debian.org/security/2015/dsa-3300

Trust: 1.1

url:http://www.debian.org/security/2015/dsa-3316

Trust: 1.1

url:http://www.debian.org/security/2015/dsa-3324

Trust: 1.1

url:http://www.debian.org/security/2015/dsa-3339

Trust: 1.1

url:http://www.debian.org/security/2016/dsa-3688

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-june/159351.html

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-june/159314.html

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-june/160117.html

Trust: 1.1

url:https://security.gentoo.org/glsa/201506-02

Trust: 1.1

url:https://security.gentoo.org/glsa/201512-10

Trust: 1.1

url:https://security.gentoo.org/glsa/201603-11

Trust: 1.1

url:https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04718196

Trust: 1.1

url:https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/

Trust: 1.1

url:https://weakdh.org/

Trust: 1.1

url:https://weakdh.org/imperfect-forward-secrecy.pdf

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpujan2021.html

Trust: 1.1

url:http://openwall.com/lists/oss-security/2015/05/20/8

Trust: 1.1

url:http://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2015-008.txt.asc

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2015-1072.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2015-1185.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2015-1197.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2015-1228.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2015-1229.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2015-1241.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2015-1242.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2015-1243.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2015-1485.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2015-1486.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2015-1488.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2015-1526.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2015-1544.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2015-1604.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2016-1624.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2016-2056.html

Trust: 1.1

url:http://www.securitytracker.com/id/1032474

Trust: 1.1

url:http://www.securitytracker.com/id/1032475

Trust: 1.1

url:http://www.securitytracker.com/id/1032476

Trust: 1.1

url:http://www.securitytracker.com/id/1032637

Trust: 1.1

url:http://www.securitytracker.com/id/1032645

Trust: 1.1

url:http://www.securitytracker.com/id/1032647

Trust: 1.1

url:http://www.securitytracker.com/id/1032648

Trust: 1.1

url:http://www.securitytracker.com/id/1032649

Trust: 1.1

url:http://www.securitytracker.com/id/1032650

Trust: 1.1

url:http://www.securitytracker.com/id/1032651

Trust: 1.1

url:http://www.securitytracker.com/id/1032652

Trust: 1.1

url:http://www.securitytracker.com/id/1032653

Trust: 1.1

url:http://www.securitytracker.com/id/1032654

Trust: 1.1

url:http://www.securitytracker.com/id/1032655

Trust: 1.1

url:http://www.securitytracker.com/id/1032656

Trust: 1.1

url:http://www.securitytracker.com/id/1032688

Trust: 1.1

url:http://www.securitytracker.com/id/1032699

Trust: 1.1

url:http://www.securitytracker.com/id/1032702

Trust: 1.1

url:http://www.securitytracker.com/id/1032727

Trust: 1.1

url:http://www.securitytracker.com/id/1032759

Trust: 1.1

url:http://www.securitytracker.com/id/1032777

Trust: 1.1

url:http://www.securitytracker.com/id/1032778

Trust: 1.1

url:http://www.securitytracker.com/id/1032783

Trust: 1.1

url:http://www.securitytracker.com/id/1032784

Trust: 1.1

url:http://www.securitytracker.com/id/1032856

Trust: 1.1

url:http://www.securitytracker.com/id/1032864

Trust: 1.1

url:http://www.securitytracker.com/id/1032865

Trust: 1.1

url:http://www.securitytracker.com/id/1032871

Trust: 1.1

url:http://www.securitytracker.com/id/1032884

Trust: 1.1

url:http://www.securitytracker.com/id/1032910

Trust: 1.1

url:http://www.securitytracker.com/id/1032932

Trust: 1.1

url:http://www.securitytracker.com/id/1032960

Trust: 1.1

url:http://www.securitytracker.com/id/1033019

Trust: 1.1

url:http://www.securitytracker.com/id/1033064

Trust: 1.1

url:http://www.securitytracker.com/id/1033065

Trust: 1.1

url:http://www.securitytracker.com/id/1033067

Trust: 1.1

url:http://www.securitytracker.com/id/1033208

Trust: 1.1

url:http://www.securitytracker.com/id/1033209

Trust: 1.1

url:http://www.securitytracker.com/id/1033210

Trust: 1.1

url:http://www.securitytracker.com/id/1033222

Trust: 1.1

url:http://www.securitytracker.com/id/1033341

Trust: 1.1

url:http://www.securitytracker.com/id/1033385

Trust: 1.1

url:http://www.securitytracker.com/id/1033416

Trust: 1.1

url:http://www.securitytracker.com/id/1033430

Trust: 1.1

url:http://www.securitytracker.com/id/1033433

Trust: 1.1

url:http://www.securitytracker.com/id/1033513

Trust: 1.1

url:http://www.securitytracker.com/id/1033760

Trust: 1.1

url:http://www.securitytracker.com/id/1033891

Trust: 1.1

url:http://www.securitytracker.com/id/1033991

Trust: 1.1

url:http://www.securitytracker.com/id/1034087

Trust: 1.1

url:http://www.securitytracker.com/id/1034728

Trust: 1.1

url:http://www.securitytracker.com/id/1034884

Trust: 1.1

url:http://www.securitytracker.com/id/1036218

Trust: 1.1

url:http://www.securitytracker.com/id/1040630

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-updates/2015-07/msg00016.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-updates/2016-02/msg00094.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-updates/2016-02/msg00097.html

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-2656-1

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-2656-2

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-2673-1

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-2696-1

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-2706-1

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=144102017024820&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=145409266329539&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=144069189622016&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=143506486712441&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=144043644216842&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=144060606031437&w=2

Trust: 1.0

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10122

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=143655800220052&w=2

Trust: 1.0

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10727

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=144060576831314&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=144050121701297&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=144061542602287&w=2

Trust: 1.0

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10681

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=143557934009303&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=143637549705650&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=144493176821532&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=144104533800819&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=143628304012255&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=143880121627664&w=2

Trust: 1.0

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbhf03831en_us

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=143558092609708&w=2

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2015-4000

Trust: 0.8

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.3

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.3

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-2808

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-7575

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-1938

Trust: 0.2

url:https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-4000

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:http://kb.juniper.net/infocenter/index?page=content&amp;id=jsa10681

Trust: 0.1

url:http://kb.juniper.net/infocenter/index?page=content&amp;id=jsa10727

Trust: 0.1

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10122

Trust: 0.1

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-hpesbhf03831en_us

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=143557934009303&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=143628304012255&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=143558092609708&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=143655800220052&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=144060576831314&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=144069189622016&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=144050121701297&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=144060606031437&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=144102017024820&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=144061542602287&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=145409266329539&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=144043644216842&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=143506486712441&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=144104533800819&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=143637549705650&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=143880121627664&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=144493176821532&amp;w=2

Trust: 0.1

url:https://softwaresupport.hp.com/group/softwaresupport/search-result/-/fa

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-8635

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4000

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2721

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-9074

Trust: 0.1

url:http://www.mitls.org/pages/attacks/sloth

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-9074

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7575

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5285

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2721

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-8635

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1938

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5285

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2834

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1979

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7182

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1950

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1978

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7181

Trust: 0.1

url:https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facets

Trust: 0.1

url:https://access.redhat.com/articles/2688611

Trust: 0.1

url:https://access.redhat.com/solutions/222023

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2109

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2106

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-2109

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2016-2054.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4459

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3195

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3183

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-2106

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-2105

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-3110

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-4459

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2108

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3195

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3183

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2105

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/jboss_enterprise_application_platform/6.4/index.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-3110

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=appplatform&downloadtype=securitypatches&version=6.4

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-2108

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4732

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4760

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2621

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2628

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2601

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4732

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4760

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2601

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2632

Trust: 0.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=1207101#c11

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2632

Trust: 0.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2621

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4733

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4748

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4731

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2625

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2625

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4749

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2590

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2808

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4733

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4749

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2590

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4731

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4748

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2628

Trust: 0.1

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n

Trust: 0.1

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.1

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.1

sources: VULHUB: VHN-81961 // PACKETSTORM: 133344 // PACKETSTORM: 140618 // PACKETSTORM: 139002 // PACKETSTORM: 133338 // PACKETSTORM: 133324 // PACKETSTORM: 139114 // PACKETSTORM: 132698 // PACKETSTORM: 134232 // NVD: CVE-2015-4000

CREDITS

HP

Trust: 0.4

sources: PACKETSTORM: 133344 // PACKETSTORM: 133338 // PACKETSTORM: 133324 // PACKETSTORM: 134232

SOURCES

db:VULHUBid:VHN-81961
db:PACKETSTORMid:133344
db:PACKETSTORMid:140618
db:PACKETSTORMid:139002
db:PACKETSTORMid:133338
db:PACKETSTORMid:133324
db:PACKETSTORMid:139114
db:PACKETSTORMid:132698
db:PACKETSTORMid:134232
db:NVDid:CVE-2015-4000

LAST UPDATE DATE

2026-03-27T21:39:13.403000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-81961date:2023-02-09T00:00:00
db:NVDid:CVE-2015-4000date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-81961date:2015-05-21T00:00:00
db:PACKETSTORMid:133344date:2015-08-27T13:19:00
db:PACKETSTORMid:140618date:2017-01-20T01:24:46
db:PACKETSTORMid:139002date:2016-10-06T20:59:47
db:PACKETSTORMid:133338date:2015-08-26T23:42:39
db:PACKETSTORMid:133324date:2015-08-26T01:35:03
db:PACKETSTORMid:139114date:2016-10-12T20:16:45
db:PACKETSTORMid:132698date:2015-07-16T17:45:39
db:PACKETSTORMid:134232date:2015-11-05T14:17:07
db:NVDid:CVE-2015-4000date:2015-05-21T00:59:00.087