ID

VAR-201505-0233


CVE

CVE-2015-4000


TITLE

TLS Encryption problem vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-201505-428

DESCRIPTION

The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue. OpenSSL is prone to a security-bypass vulnerability because the application fails to properly verify SSL, TLS, and DTLS certificates. Successfully exploiting this issue allows attackers to perform man-in-the-middle attacks and bypass certain security restrictions. This may aid in further attacks. OpenSSL versions 1.0.2c, 1.0.2b, 1.0.1n, and 1.0.1o are vulnerable. ============================================================================ Ubuntu Security Notice USN-2656-2 July 15, 2015 firefox vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 LTS Summary: Firefox could be made to crash or run programs as your login if it opened a malicious website. Software Description: - firefox: Mozilla Open Source web browser Details: USN-2656-1 fixed vulnerabilities in Firefox for Ubuntu 14.04 LTS and later releases. This update provides the corresponding update for Ubuntu 12.04 LTS. Original advisory details: Karthikeyan Bhargavan discovered that NSS incorrectly handled state transitions for the TLS state machine. (CVE-2015-2721) Looben Yan discovered 2 use-after-free issues when using XMLHttpRequest in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-2722, CVE-2015-2733) Bob Clary, Christian Holler, Bobby Holley, Andrew McCreight, Terrence Cole, Steve Fink, Mats Palmgren, Wes Kocher, Andreas Pehrson, Tooru Fujisawa, Andrew Sutherland, and Gary Kwong discovered multiple memory safety issues in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-2724, CVE-2015-2725, CVE-2015-2726) Armin Razmdjou discovered that opening hyperlinks with specific mouse and key combinations could allow a Chrome privileged URL to be opened without context restrictions being preserved. (CVE-2015-2727) Paul Bandha discovered a type confusion bug in the Indexed DB Manager. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash or execute arbitrary code with the priviliges of the user invoking Firefox. (CVE-2015-2728) Holger Fuhrmannek discovered an out-of-bounds read in Web Audio. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to obtain sensitive information. (CVE-2015-2729) Watson Ladd discovered that NSS incorrectly handled Elliptical Curve Cryptography (ECC) multiplication. A remote attacker could possibly use this issue to spoof ECDSA signatures. (CVE-2015-2730) A use-after-free was discovered when a Content Policy modifies the DOM to remove a DOM object. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash or execute arbitrary code with the priviliges of the user invoking Firefox. (CVE-2015-2731) Ronald Crane discovered multiple security vulnerabilities. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-2734, CVE-2015-2735, CVE-2015-2736, CVE-2015-2737, CVE-2015-2738, CVE-2015-2739, CVE-2015-2740) David Keeler discovered that key pinning checks can be skipped when an overridable certificate error occurs. This allows a user to manually override an error for a fake certificate, but cannot be exploited on its own. (CVE-2015-2741) Jonas Jenwald discovered that some internal workers were incorrectly executed with a high privilege. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this in combination with another security vulnerability, to execute arbitrary code in a privileged scope. (CVE-2015-2743) Matthew Green discovered a DHE key processing issue in NSS where a MITM could force a server to downgrade TLS connections to 512-bit export-grade cryptography. An attacker could potentially exploit this to impersonate the server. (CVE-2015-4000) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 LTS: firefox 39.0+build5-0ubuntu0.12.04.2 After a standard system update you need to restart Firefox to make all the necessary changes. An attacker could exploit these to cause a denial of service or expose sensitive data over the network. (CVE-2015-2590, CVE-2015-2628, CVE-2015-4731, CVE-2015-4732, CVE-2015-4733, CVE-2015-4760, CVE-2015-4748) Several vulnerabilities were discovered in the cryptographic components of the OpenJDK JRE. Several vulnerabilities were discovered in the OpenJDK JRE related to information disclosure. (CVE-2015-2621, CVE-2015-2632) A vulnerability was discovered with how the JNDI component of the OpenJDK JRE handles DNS resolutions. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n a-c04926789 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04926789 Version: 1 HPSBUX03435 SSRT102977 rev.1 - HP-UX Web Server Suite running Apache, Remote Denial of Service (DoS) NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2016-01-07 Last Updated: 2016-01-07 Potential Security Impact: Remote Denial of Service (DoS) Source: Hewlett Packard Enterprise, Product Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP-UX Web Server Suite running Apache on HP-UX 11iv3. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS) and other impacts including: The TLS vulnerability using US export-grade 512-bit keys in Diffie-Hellman key exchange known as "Logjam" could be exploited remotely to allow unauthorized modification. The RC4 stream cipher vulnerability in SSL/TLS known as "Bar Mitzvah" could be exploited remotely to allow disclosure of information. Apache does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters. References: CVE-2015-4000 CVE-2015-2808 CVE-2015-3183 PSRT102977 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX Web Server Suite v4.05 HPUXWSATW405 httpd prior to 2.2.29.02 BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2015-4000 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2015-2808 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2015-3183 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HPE has provided the following software updates to resolve the vulnerabilities with HP-UX Web Server Suite running Apache. The updates are available for download from the following location: https://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumbe r=HPUXWSATW406 Issues addressed: CVE-2015-4000: Disable Export cipher by default. DH parameter with 1024 bits is used by default. Allow to configure custom DHE or ECDHE parameters by appending the concerned parameter file to the certificate file given for the SSLCertificateFile directive. CVE-2015-2808: Disable RC4 cipher in configuration file. Notes: HP-UX Web Server Suite v4.06 HPUXWSATW406 contains the following components: Apache B.2.2.29.02 Tomcat Servlet Engine C.6.0.43.01 PHP 5.4.40.1 (Part of Apache) Webmin A.1.070.13 See HPE Security Bulletin HPSBUX03512 for information about resolution for Apache web server of HP-UX 11iv2 at the following location: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04832246 MANUAL ACTIONS: Yes - Update Download and install the software update PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HPE and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa The following text is for use by the HP-UX Software Assistant. AFFECTED VERSIONS HP-UX B.11.31 IA/PA =================== hpuxws22APACHE.APACHE hpuxws22APACHE.AUTH_LDAP hpuxws22APACHE.MOD_JK hpuxws22APACHE.MOD_PERL hpuxws22APACHE.PHP hpuxws22APACHE.WEBPROXY action: install revision B.2.2.29.02 or subsequent hpuxws22TOMCAT.TOMCAT action: install revision C.6.0.43.01 or subsequent HP-UX B.11.31 PA ================ hpuxws22APACHE.APACHE2 hpuxws22APACHE.AUTH_LDAP2 hpuxws22APACHE.MOD_JK2 hpuxws22APACHE.MOD_PERL2 hpuxws22APACHE.PHP2 hpuxws22APACHE.WEBPROXY2 action: install revision B.2.2.29.02 or subsequent HP-UX B.11.23 IA/PA =================== hpuxws22WEBMIN.HPDOCS hpuxws22WEBMIN.WEBMIN action: install revision A.1.070.13 or subsequent END AFFECTED VERSIONS HISTORY Version:1 (rev.1) - 7 January 2016 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability with any HPE supported product, send Email to: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. This may allow remote disclosure of information. Do the following to mitigate the logjam issue in HP-UX Firefox and Thunderbird: HP-UX Firefox browser: Visit about:config in the Firefox browser Search for ssl3 and disable DHE_EXPORT ciphers by setting below preferences values to false. security.ssl3.dhe_rsa_aes_128_sha security.ssl3.dhe_rsa_aes_256_sha Restart the browser HP-UX Thunderbird: Select "Preferences" from the "Edit" menu Select "Advanced" Tab and then click on "Config Editor" button Search for security.ssl3.dhe_rsa_aes and disable DHE_EXPORT ciphers by setting below preference values to false. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: nss security update Advisory ID: RHSA-2015:1185-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1185.html Issue date: 2015-06-25 CVE Names: CVE-2015-4000 ===================================================================== 1. Summary: Updated nss and nss-util packages that fix one security issue, several bugs and add various enhancements are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. A flaw was found in the way the TLS protocol composes the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. (CVE-2015-4000) Note: This update forces the TLS/SSL client implementation in NSS to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Future updates may raise this limit to 1024 bits. The nss and nss-util packages have been upgraded to upstream versions 3.19.1. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Users of nss and nss-util are advised to upgrade to these updated packages, which fix these security flaws, bugs, and add these enhancements. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: nss-3.19.1-3.el6_6.src.rpm nss-util-3.19.1-1.el6_6.src.rpm i386: nss-3.19.1-3.el6_6.i686.rpm nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-sysinit-3.19.1-3.el6_6.i686.rpm nss-tools-3.19.1-3.el6_6.i686.rpm nss-util-3.19.1-1.el6_6.i686.rpm nss-util-debuginfo-3.19.1-1.el6_6.i686.rpm x86_64: nss-3.19.1-3.el6_6.i686.rpm nss-3.19.1-3.el6_6.x86_64.rpm nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-debuginfo-3.19.1-3.el6_6.x86_64.rpm nss-sysinit-3.19.1-3.el6_6.x86_64.rpm nss-tools-3.19.1-3.el6_6.x86_64.rpm nss-util-3.19.1-1.el6_6.i686.rpm nss-util-3.19.1-1.el6_6.x86_64.rpm nss-util-debuginfo-3.19.1-1.el6_6.i686.rpm nss-util-debuginfo-3.19.1-1.el6_6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-devel-3.19.1-3.el6_6.i686.rpm nss-pkcs11-devel-3.19.1-3.el6_6.i686.rpm nss-util-debuginfo-3.19.1-1.el6_6.i686.rpm nss-util-devel-3.19.1-1.el6_6.i686.rpm x86_64: nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-debuginfo-3.19.1-3.el6_6.x86_64.rpm nss-devel-3.19.1-3.el6_6.i686.rpm nss-devel-3.19.1-3.el6_6.x86_64.rpm nss-pkcs11-devel-3.19.1-3.el6_6.i686.rpm nss-pkcs11-devel-3.19.1-3.el6_6.x86_64.rpm nss-util-debuginfo-3.19.1-1.el6_6.i686.rpm nss-util-debuginfo-3.19.1-1.el6_6.x86_64.rpm nss-util-devel-3.19.1-1.el6_6.i686.rpm nss-util-devel-3.19.1-1.el6_6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: nss-3.19.1-3.el6_6.src.rpm nss-util-3.19.1-1.el6_6.src.rpm x86_64: nss-3.19.1-3.el6_6.i686.rpm nss-3.19.1-3.el6_6.x86_64.rpm nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-debuginfo-3.19.1-3.el6_6.x86_64.rpm nss-sysinit-3.19.1-3.el6_6.x86_64.rpm nss-tools-3.19.1-3.el6_6.x86_64.rpm nss-util-3.19.1-1.el6_6.i686.rpm nss-util-3.19.1-1.el6_6.x86_64.rpm nss-util-debuginfo-3.19.1-1.el6_6.i686.rpm nss-util-debuginfo-3.19.1-1.el6_6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-debuginfo-3.19.1-3.el6_6.x86_64.rpm nss-devel-3.19.1-3.el6_6.i686.rpm nss-devel-3.19.1-3.el6_6.x86_64.rpm nss-pkcs11-devel-3.19.1-3.el6_6.i686.rpm nss-pkcs11-devel-3.19.1-3.el6_6.x86_64.rpm nss-util-debuginfo-3.19.1-1.el6_6.i686.rpm nss-util-debuginfo-3.19.1-1.el6_6.x86_64.rpm nss-util-devel-3.19.1-1.el6_6.i686.rpm nss-util-devel-3.19.1-1.el6_6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: nss-3.19.1-3.el6_6.src.rpm nss-util-3.19.1-1.el6_6.src.rpm i386: nss-3.19.1-3.el6_6.i686.rpm nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-devel-3.19.1-3.el6_6.i686.rpm nss-sysinit-3.19.1-3.el6_6.i686.rpm nss-tools-3.19.1-3.el6_6.i686.rpm nss-util-3.19.1-1.el6_6.i686.rpm nss-util-debuginfo-3.19.1-1.el6_6.i686.rpm nss-util-devel-3.19.1-1.el6_6.i686.rpm ppc64: nss-3.19.1-3.el6_6.ppc.rpm nss-3.19.1-3.el6_6.ppc64.rpm nss-debuginfo-3.19.1-3.el6_6.ppc.rpm nss-debuginfo-3.19.1-3.el6_6.ppc64.rpm nss-devel-3.19.1-3.el6_6.ppc.rpm nss-devel-3.19.1-3.el6_6.ppc64.rpm nss-sysinit-3.19.1-3.el6_6.ppc64.rpm nss-tools-3.19.1-3.el6_6.ppc64.rpm nss-util-3.19.1-1.el6_6.ppc.rpm nss-util-3.19.1-1.el6_6.ppc64.rpm nss-util-debuginfo-3.19.1-1.el6_6.ppc.rpm nss-util-debuginfo-3.19.1-1.el6_6.ppc64.rpm nss-util-devel-3.19.1-1.el6_6.ppc.rpm nss-util-devel-3.19.1-1.el6_6.ppc64.rpm s390x: nss-3.19.1-3.el6_6.s390.rpm nss-3.19.1-3.el6_6.s390x.rpm nss-debuginfo-3.19.1-3.el6_6.s390.rpm nss-debuginfo-3.19.1-3.el6_6.s390x.rpm nss-devel-3.19.1-3.el6_6.s390.rpm nss-devel-3.19.1-3.el6_6.s390x.rpm nss-sysinit-3.19.1-3.el6_6.s390x.rpm nss-tools-3.19.1-3.el6_6.s390x.rpm nss-util-3.19.1-1.el6_6.s390.rpm nss-util-3.19.1-1.el6_6.s390x.rpm nss-util-debuginfo-3.19.1-1.el6_6.s390.rpm nss-util-debuginfo-3.19.1-1.el6_6.s390x.rpm nss-util-devel-3.19.1-1.el6_6.s390.rpm nss-util-devel-3.19.1-1.el6_6.s390x.rpm x86_64: nss-3.19.1-3.el6_6.i686.rpm nss-3.19.1-3.el6_6.x86_64.rpm nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-debuginfo-3.19.1-3.el6_6.x86_64.rpm nss-devel-3.19.1-3.el6_6.i686.rpm nss-devel-3.19.1-3.el6_6.x86_64.rpm nss-sysinit-3.19.1-3.el6_6.x86_64.rpm nss-tools-3.19.1-3.el6_6.x86_64.rpm nss-util-3.19.1-1.el6_6.i686.rpm nss-util-3.19.1-1.el6_6.x86_64.rpm nss-util-debuginfo-3.19.1-1.el6_6.i686.rpm nss-util-debuginfo-3.19.1-1.el6_6.x86_64.rpm nss-util-devel-3.19.1-1.el6_6.i686.rpm nss-util-devel-3.19.1-1.el6_6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-pkcs11-devel-3.19.1-3.el6_6.i686.rpm ppc64: nss-debuginfo-3.19.1-3.el6_6.ppc.rpm nss-debuginfo-3.19.1-3.el6_6.ppc64.rpm nss-pkcs11-devel-3.19.1-3.el6_6.ppc.rpm nss-pkcs11-devel-3.19.1-3.el6_6.ppc64.rpm s390x: nss-debuginfo-3.19.1-3.el6_6.s390.rpm nss-debuginfo-3.19.1-3.el6_6.s390x.rpm nss-pkcs11-devel-3.19.1-3.el6_6.s390.rpm nss-pkcs11-devel-3.19.1-3.el6_6.s390x.rpm x86_64: nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-debuginfo-3.19.1-3.el6_6.x86_64.rpm nss-pkcs11-devel-3.19.1-3.el6_6.i686.rpm nss-pkcs11-devel-3.19.1-3.el6_6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: nss-3.19.1-3.el6_6.src.rpm nss-util-3.19.1-1.el6_6.src.rpm i386: nss-3.19.1-3.el6_6.i686.rpm nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-devel-3.19.1-3.el6_6.i686.rpm nss-sysinit-3.19.1-3.el6_6.i686.rpm nss-tools-3.19.1-3.el6_6.i686.rpm nss-util-3.19.1-1.el6_6.i686.rpm nss-util-debuginfo-3.19.1-1.el6_6.i686.rpm nss-util-devel-3.19.1-1.el6_6.i686.rpm x86_64: nss-3.19.1-3.el6_6.i686.rpm nss-3.19.1-3.el6_6.x86_64.rpm nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-debuginfo-3.19.1-3.el6_6.x86_64.rpm nss-devel-3.19.1-3.el6_6.i686.rpm nss-devel-3.19.1-3.el6_6.x86_64.rpm nss-sysinit-3.19.1-3.el6_6.x86_64.rpm nss-tools-3.19.1-3.el6_6.x86_64.rpm nss-util-3.19.1-1.el6_6.i686.rpm nss-util-3.19.1-1.el6_6.x86_64.rpm nss-util-debuginfo-3.19.1-1.el6_6.i686.rpm nss-util-debuginfo-3.19.1-1.el6_6.x86_64.rpm nss-util-devel-3.19.1-1.el6_6.i686.rpm nss-util-devel-3.19.1-1.el6_6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-pkcs11-devel-3.19.1-3.el6_6.i686.rpm x86_64: nss-debuginfo-3.19.1-3.el6_6.i686.rpm nss-debuginfo-3.19.1-3.el6_6.x86_64.rpm nss-pkcs11-devel-3.19.1-3.el6_6.i686.rpm nss-pkcs11-devel-3.19.1-3.el6_6.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: nss-3.19.1-3.el7_1.src.rpm nss-util-3.19.1-1.el7_1.src.rpm x86_64: nss-3.19.1-3.el7_1.i686.rpm nss-3.19.1-3.el7_1.x86_64.rpm nss-debuginfo-3.19.1-3.el7_1.i686.rpm nss-debuginfo-3.19.1-3.el7_1.x86_64.rpm nss-sysinit-3.19.1-3.el7_1.x86_64.rpm nss-tools-3.19.1-3.el7_1.x86_64.rpm nss-util-3.19.1-1.el7_1.i686.rpm nss-util-3.19.1-1.el7_1.x86_64.rpm nss-util-debuginfo-3.19.1-1.el7_1.i686.rpm nss-util-debuginfo-3.19.1-1.el7_1.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: nss-debuginfo-3.19.1-3.el7_1.i686.rpm nss-debuginfo-3.19.1-3.el7_1.x86_64.rpm nss-devel-3.19.1-3.el7_1.i686.rpm nss-devel-3.19.1-3.el7_1.x86_64.rpm nss-pkcs11-devel-3.19.1-3.el7_1.i686.rpm nss-pkcs11-devel-3.19.1-3.el7_1.x86_64.rpm nss-util-debuginfo-3.19.1-1.el7_1.i686.rpm nss-util-debuginfo-3.19.1-1.el7_1.x86_64.rpm nss-util-devel-3.19.1-1.el7_1.i686.rpm nss-util-devel-3.19.1-1.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: nss-3.19.1-3.el7_1.src.rpm nss-util-3.19.1-1.el7_1.src.rpm x86_64: nss-3.19.1-3.el7_1.i686.rpm nss-3.19.1-3.el7_1.x86_64.rpm nss-debuginfo-3.19.1-3.el7_1.i686.rpm nss-debuginfo-3.19.1-3.el7_1.x86_64.rpm nss-sysinit-3.19.1-3.el7_1.x86_64.rpm nss-tools-3.19.1-3.el7_1.x86_64.rpm nss-util-3.19.1-1.el7_1.i686.rpm nss-util-3.19.1-1.el7_1.x86_64.rpm nss-util-debuginfo-3.19.1-1.el7_1.i686.rpm nss-util-debuginfo-3.19.1-1.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: nss-debuginfo-3.19.1-3.el7_1.i686.rpm nss-debuginfo-3.19.1-3.el7_1.x86_64.rpm nss-devel-3.19.1-3.el7_1.i686.rpm nss-devel-3.19.1-3.el7_1.x86_64.rpm nss-pkcs11-devel-3.19.1-3.el7_1.i686.rpm nss-pkcs11-devel-3.19.1-3.el7_1.x86_64.rpm nss-util-debuginfo-3.19.1-1.el7_1.i686.rpm nss-util-debuginfo-3.19.1-1.el7_1.x86_64.rpm nss-util-devel-3.19.1-1.el7_1.i686.rpm nss-util-devel-3.19.1-1.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: nss-3.19.1-3.el7_1.src.rpm nss-util-3.19.1-1.el7_1.src.rpm ppc64: nss-3.19.1-3.el7_1.ppc.rpm nss-3.19.1-3.el7_1.ppc64.rpm nss-debuginfo-3.19.1-3.el7_1.ppc.rpm nss-debuginfo-3.19.1-3.el7_1.ppc64.rpm nss-devel-3.19.1-3.el7_1.ppc.rpm nss-devel-3.19.1-3.el7_1.ppc64.rpm nss-sysinit-3.19.1-3.el7_1.ppc64.rpm nss-tools-3.19.1-3.el7_1.ppc64.rpm nss-util-3.19.1-1.el7_1.ppc.rpm nss-util-3.19.1-1.el7_1.ppc64.rpm nss-util-debuginfo-3.19.1-1.el7_1.ppc.rpm nss-util-debuginfo-3.19.1-1.el7_1.ppc64.rpm nss-util-devel-3.19.1-1.el7_1.ppc.rpm nss-util-devel-3.19.1-1.el7_1.ppc64.rpm s390x: nss-3.19.1-3.el7_1.s390.rpm nss-3.19.1-3.el7_1.s390x.rpm nss-debuginfo-3.19.1-3.el7_1.s390.rpm nss-debuginfo-3.19.1-3.el7_1.s390x.rpm nss-devel-3.19.1-3.el7_1.s390.rpm nss-devel-3.19.1-3.el7_1.s390x.rpm nss-sysinit-3.19.1-3.el7_1.s390x.rpm nss-tools-3.19.1-3.el7_1.s390x.rpm nss-util-3.19.1-1.el7_1.s390.rpm nss-util-3.19.1-1.el7_1.s390x.rpm nss-util-debuginfo-3.19.1-1.el7_1.s390.rpm nss-util-debuginfo-3.19.1-1.el7_1.s390x.rpm nss-util-devel-3.19.1-1.el7_1.s390.rpm nss-util-devel-3.19.1-1.el7_1.s390x.rpm x86_64: nss-3.19.1-3.el7_1.i686.rpm nss-3.19.1-3.el7_1.x86_64.rpm nss-debuginfo-3.19.1-3.el7_1.i686.rpm nss-debuginfo-3.19.1-3.el7_1.x86_64.rpm nss-devel-3.19.1-3.el7_1.i686.rpm nss-devel-3.19.1-3.el7_1.x86_64.rpm nss-sysinit-3.19.1-3.el7_1.x86_64.rpm nss-tools-3.19.1-3.el7_1.x86_64.rpm nss-util-3.19.1-1.el7_1.i686.rpm nss-util-3.19.1-1.el7_1.x86_64.rpm nss-util-debuginfo-3.19.1-1.el7_1.i686.rpm nss-util-debuginfo-3.19.1-1.el7_1.x86_64.rpm nss-util-devel-3.19.1-1.el7_1.i686.rpm nss-util-devel-3.19.1-1.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: nss-3.19.1-3.ael7b_1.src.rpm nss-util-3.19.1-1.ael7b_1.src.rpm ppc64le: nss-3.19.1-3.ael7b_1.ppc64le.rpm nss-debuginfo-3.19.1-3.ael7b_1.ppc64le.rpm nss-devel-3.19.1-3.ael7b_1.ppc64le.rpm nss-sysinit-3.19.1-3.ael7b_1.ppc64le.rpm nss-tools-3.19.1-3.ael7b_1.ppc64le.rpm nss-util-3.19.1-1.ael7b_1.ppc64le.rpm nss-util-debuginfo-3.19.1-1.ael7b_1.ppc64le.rpm nss-util-devel-3.19.1-1.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: nss-debuginfo-3.19.1-3.el7_1.ppc.rpm nss-debuginfo-3.19.1-3.el7_1.ppc64.rpm nss-pkcs11-devel-3.19.1-3.el7_1.ppc.rpm nss-pkcs11-devel-3.19.1-3.el7_1.ppc64.rpm s390x: nss-debuginfo-3.19.1-3.el7_1.s390.rpm nss-debuginfo-3.19.1-3.el7_1.s390x.rpm nss-pkcs11-devel-3.19.1-3.el7_1.s390.rpm nss-pkcs11-devel-3.19.1-3.el7_1.s390x.rpm x86_64: nss-debuginfo-3.19.1-3.el7_1.i686.rpm nss-debuginfo-3.19.1-3.el7_1.x86_64.rpm nss-pkcs11-devel-3.19.1-3.el7_1.i686.rpm nss-pkcs11-devel-3.19.1-3.el7_1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64le: nss-debuginfo-3.19.1-3.ael7b_1.ppc64le.rpm nss-pkcs11-devel-3.19.1-3.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: nss-3.19.1-3.el7_1.src.rpm nss-util-3.19.1-1.el7_1.src.rpm x86_64: nss-3.19.1-3.el7_1.i686.rpm nss-3.19.1-3.el7_1.x86_64.rpm nss-debuginfo-3.19.1-3.el7_1.i686.rpm nss-debuginfo-3.19.1-3.el7_1.x86_64.rpm nss-devel-3.19.1-3.el7_1.i686.rpm nss-devel-3.19.1-3.el7_1.x86_64.rpm nss-sysinit-3.19.1-3.el7_1.x86_64.rpm nss-tools-3.19.1-3.el7_1.x86_64.rpm nss-util-3.19.1-1.el7_1.i686.rpm nss-util-3.19.1-1.el7_1.x86_64.rpm nss-util-debuginfo-3.19.1-1.el7_1.i686.rpm nss-util-debuginfo-3.19.1-1.el7_1.x86_64.rpm nss-util-devel-3.19.1-1.el7_1.i686.rpm nss-util-devel-3.19.1-1.el7_1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: nss-debuginfo-3.19.1-3.el7_1.i686.rpm nss-debuginfo-3.19.1-3.el7_1.x86_64.rpm nss-pkcs11-devel-3.19.1-3.el7_1.i686.rpm nss-pkcs11-devel-3.19.1-3.el7_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-4000 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVi60dXlSAg2UNWIIRAjqOAJ9fdQ42RbvWJ5RAAdEKHgCPYjidUQCePzlw +s/6Irm6/MeLWN04y51L8ww= =jxpf -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 1.98

sources: NVD: CVE-2015-4000 // BID: 75652 // VULMON: CVE-2015-4000 // PACKETSTORM: 135510 // PACKETSTORM: 132699 // PACKETSTORM: 132757 // PACKETSTORM: 132894 // PACKETSTORM: 135172 // PACKETSTORM: 132989 // PACKETSTORM: 134755 // PACKETSTORM: 132439

AFFECTED PRODUCTS

vendor:mozillamodel:firefox osscope:eqversion:2.2

Trust: 1.6

vendor:mozillamodel:firefox esrscope:eqversion:31.8

Trust: 1.6

vendor:mozillamodel:thunderbirdscope:eqversion:31.8

Trust: 1.6

vendor:mozillamodel:thunderbirdscope:eqversion:38.1

Trust: 1.6

vendor:mozillamodel:seamonkeyscope:eqversion:2.35

Trust: 1.6

vendor:mozillamodel:firefoxscope:eqversion:39.0

Trust: 1.6

vendor:oraclemodel:jrockitscope:eqversion:r28.3.6

Trust: 1.0

vendor:oraclemodel:sparc-opl service processorscope:lteversion:1121

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.6.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.10

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:hpmodel:hp-uxscope:eqversion:b.11.31

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:12

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.0.2

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.19

Trust: 1.0

vendor:applemodel:iphone osscope:lteversion:8.3

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:38.1.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:15.04

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.8.0

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.7.0

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.6.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.8.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion: -

Trust: 1.0

vendor:opensslmodel:opensslscope:lteversion:1.0.2a

Trust: 1.0

vendor:applemodel:mac os xscope:lteversion:10.10.3

Trust: 1.0

vendor:opensslmodel:opensslscope:lteversion:1.0.1m

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.7.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.0.1

Trust: 1.0

vendor:microsoftmodel:internet explorerscope:eqversion: -

Trust: 1.0

vendor:googlemodel:chromescope:eqversion: -

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion: -

Trust: 1.0

vendor:ibmmodel:content managerscope:eqversion:8.5

Trust: 1.0

vendor:susemodel:linux enterprise software development kitscope:eqversion:12

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:11.0

Trust: 1.0

vendor:operamodel:browserscope:eqversion: -

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:12

Trust: 1.0

vendor:junipermodel:junos 12.1x44-d20scope: - version: -

Trust: 0.9

vendor:junipermodel:junos 12.1x46-d25scope: - version: -

Trust: 0.6

vendor:mozillamodel:firefox esrscope:eqversion:38.1.0

Trust: 0.6

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.2.0.3

Trust: 0.3

vendor:ibmmodel:security network controller 1.0.3361mscope: - version: -

Trust: 0.3

vendor:ciscomodel:registered envelope servicescope:eqversion:0

Trust: 0.3

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.53

Trust: 0.3

vendor:hpmodel:hp-ux b.11.22scope: - version: -

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d33scope: - version: -

Trust: 0.3

vendor:ibmmodel:i v5r4scope:eqversion:6.1

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:8.2

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d25scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.1r3scope: - version: -

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:9.1.1

Trust: 0.3

vendor:oraclemodel:enterprise manager base platformscope:eqversion:12.1.0.4

Trust: 0.3

vendor:ibmmodel:worklight foundation consumer editionscope:eqversion:6.20

Trust: 0.3

vendor:junipermodel:junos 13.3r5scope: - version: -

Trust: 0.3

vendor:ibmmodel:rational tauscope:eqversion:4.35

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.1209

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.1.0.4

Trust: 0.3

vendor:ibmmodel:i v5r3scope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:netinsightscope:eqversion:8.6.0

Trust: 0.3

vendor:oraclemodel:agile engineering data managementscope:eqversion:6.1.2.2

Trust: 0.3

vendor:ciscomodel:ios xescope:neversion:3.14

Trust: 0.3

vendor:ibmmodel:rational automation framework ifix5scope:neversion:3.0.1.3

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d35scope: - version: -

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.3361

Trust: 0.3

vendor:ibmmodel:rational automation frameworkscope:eqversion:3.0.1.1

Trust: 0.3

vendor:oraclemodel:jd edwards enterpriseone toolsscope:eqversion:9.2

Trust: 0.3

vendor:hpmodel:hp-ux b.11.04scope: - version: -

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.13-34

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d51scope: - version: -

Trust: 0.3

vendor:ciscomodel:prime license managerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:worklight foundation enterprise editionscope:eqversion:6.20

Trust: 0.3

vendor:ciscomodel:agent for openflowscope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d34scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r6scope: - version: -

Trust: 0.3

vendor:ibmmodel:rational automation frameworkscope:eqversion:3.0.1.3

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.1

Trust: 0.3

vendor:hpmodel:imc productsscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:digital media players series 5.4 rbscope:neversion:4400

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d10scope: - version: -

Trust: 0.3

vendor:ciscomodel:digital media players seriesscope:eqversion:44000

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.16-37

Trust: 0.3

vendor:ciscomodel:digital media players 5.3 rbscope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d50scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r4scope: - version: -

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.11

Trust: 0.3

vendor:ibmmodel:rational application developer for webspherescope:eqversion:9.1.1

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:11.1

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d15scope: - version: -

Trust: 0.3

vendor:ibmmodel:rational application developer for webspherescope:eqversion:9.1

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.4-23

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:neversion:10.0

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.25-57

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.18-43

Trust: 0.3

vendor:ciscomodel:telepresence conductor xc4.0scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios xescope:neversion:3.16

Trust: 0.3

vendor:ibmmodel:security appscan enterprisescope:eqversion:9.0.1

Trust: 0.3

vendor:oraclemodel:ethernet switch es2-64scope:neversion:2.0.0.6

Trust: 0.3

vendor:ciscomodel:ios xescope:neversion:3.15

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:11.1.3

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.913

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d20scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.3r2scope: - version: -

Trust: 0.3

vendor:ibmmodel:aspera enterprise serverscope:eqversion:3.5.5

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.20

Trust: 0.3

vendor:junipermodel:junos d30scope:eqversion:12.1x44

Trust: 0.3

vendor:ciscomodel:local collector appliancescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:mobilefirst platform foundationscope:eqversion:6.3.0.0

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:neversion:12.2

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.11-28

Trust: 0.3

vendor:ibmmodel:security appscan enterprisescope:eqversion:9.0.2

Trust: 0.3

vendor:oraclemodel:ethernet switch es2-72scope:neversion:2.0.0.6

Trust: 0.3

vendor:junipermodel:junos 15.1r2scope:neversion: -

Trust: 0.3

vendor:ibmmodel:rational tauscope:eqversion:4.36

Trust: 0.3

vendor:ibmmodel:security network controller 1.0.3350mscope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.2r1scope: - version: -

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.3

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:neversion:10.5.1

Trust: 0.3

vendor:junipermodel:junos 14.1r2scope: - version: -

Trust: 0.3

vendor:oraclemodel:ethernet switch es2-64scope:eqversion:1.9.1

Trust: 0.3

vendor:oraclemodel:enterprise manager base platformscope:eqversion:12.1.0.5

Trust: 0.3

vendor:ibmmodel:rational tauscope:eqversion:4.34

Trust: 0.3

vendor:ciscomodel:digital media players 5.4 rbscope:neversion: -

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.5

Trust: 0.3

vendor:ibmmodel:rational automation frameworkscope:eqversion:3.0.1

Trust: 0.3

vendor:oraclemodel:jd edwards world security a9.4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r4scope: - version: -

Trust: 0.3

vendor:oraclemodel:sun blade ethernet switched nem 24p 10gescope:eqversion:60000

Trust: 0.3

vendor:ciscomodel:packet tracerscope:eqversion:5.2

Trust: 0.3

vendor:ciscomodel:registered envelope servicescope:neversion:4.4.1

Trust: 0.3

vendor:ibmmodel:aspera orchestratorscope:eqversion:2.3

Trust: 0.3

vendor:junipermodel:junos 12.3r6scope: - version: -

Trust: 0.3

vendor:oraclemodel:ethernet switch es2-72scope:eqversion:1.9.1

Trust: 0.3

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.54

Trust: 0.3

vendor:ciscomodel:partner supporting servicescope:eqversion:0

Trust: 0.3

vendor:oraclemodel:oss support toolsscope:eqversion:8.9.15.9.8

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d20scope: - version: -

Trust: 0.3

vendor:ibmmodel:worklight consumer editionscope:eqversion:6.1.0.0

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.15-36

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d55scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos d40scope:eqversion:12.1x44

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d30.4scope: - version: -

Trust: 0.3

vendor:ciscomodel:prime collaboration deploymentscope:eqversion:0

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1pscope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1r1scope: - version: -

Trust: 0.3

vendor:ibmmodel:security network controller 1.0.3379mscope: - version: -

Trust: 0.3

vendor:ciscomodel:packet tracerscope:eqversion:5.3

Trust: 0.3

vendor:junipermodel:junos d20scope:eqversion:12.1x44

Trust: 0.3

vendor:hpmodel:comware productsscope:eqversion:50

Trust: 0.3

vendor:ciscomodel:prime network services controller 3.4.1cscope:neversion: -

Trust: 0.3

vendor:ibmmodel:rational application developer for webspherescope:eqversion:9.1.0.1

Trust: 0.3

vendor:oraclemodel:endeca serverscope:eqversion:7.6.0

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11.16.09scope: - version: -

Trust: 0.3

vendor:oraclemodel:integrated lights out managerscope:eqversion:3.2

Trust: 0.3

vendor:ciscomodel:jabber software development kitscope:eqversion:0

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:14.1

Trust: 0.3

vendor:ibmmodel:rational automation frameworkscope:eqversion:3.0.1.2

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.21

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d10scope: - version: -

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.1768

Trust: 0.3

vendor:oraclemodel:business intelligence enterprise editionscope:eqversion:11.1.1.9

Trust: 0.3

vendor:ciscomodel:webex messenger service ep1scope:neversion:7.9.9

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.15

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:9.1

Trust: 0.3

vendor:oraclemodel:switch es1-24scope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:1.0.2919

Trust: 0.3

vendor:ibmmodel:worklight enterprise editionscope:eqversion:6.1.0.0

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11.13.14scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r6scope:neversion: -

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.15

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.25

Trust: 0.3

vendor:hpmodel:comware productsscope:eqversion:70

Trust: 0.3

vendor:ibmmodel:worklight consumer editionscope:eqversion:6.1.0.2

Trust: 0.3

vendor:oraclemodel:integrated lights out managerscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:ios xescope:neversion:3.13

Trust: 0.3

vendor:freebsdmodel:10.1-stablescope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23.1.007scope: - version: -

Trust: 0.3

vendor:oraclemodel:endeca serverscope:eqversion:7.5.0

Trust: 0.3

vendor:oraclemodel:sun network 10ge switch 72pscope:eqversion:0

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11scope: - version: -

Trust: 0.3

vendor:oraclemodel:integrated lights out managerscope:eqversion:3.1

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:8.5

Trust: 0.3

vendor:ciscomodel:prime security managerscope:neversion:9.3.4.2-4

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:14.1

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.29-9

Trust: 0.3

vendor:oraclemodel:business intelligence enterprise editionscope:eqversion:11.1.1.7

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:8.6

Trust: 0.3

vendor:ciscomodel:industrial routerscope:eqversion:9100

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:9.0

Trust: 0.3

vendor:ibmmodel:security network controller 1.0.3352mscope: - version: -

Trust: 0.3

vendor:ciscomodel:security manager sp1scope:neversion:4.8

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:neversion:12.1.4

Trust: 0.3

vendor:ibmmodel:rational tau interim fixscope:eqversion:4.3.0.6

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:50000

Trust: 0.3

vendor:ibmmodel:infosphere information serverscope:eqversion:11.3

Trust: 0.3

vendor:ciscomodel:local collector appliancescope:neversion:2.2.10

Trust: 0.3

vendor:ibmmodel:i v5r4scope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.0

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1nscope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1oscope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d26scope: - version: -

Trust: 0.3

vendor:slackwaremodel:linux x86 64 -currentscope: - version: -

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:14.0

Trust: 0.3

vendor:junipermodel:junos 14.2r2scope: - version: -

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:neversion:12.3

Trust: 0.3

vendor:ibmmodel:i v5r3scope:eqversion:7.1

Trust: 0.3

vendor:ciscomodel:digital media playersscope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos d10scope:eqversion:12.1x44

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d35scope: - version: -

Trust: 0.3

vendor:ibmmodel:i v5r4scope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.2

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11.02.008scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d25scope: - version: -

Trust: 0.3

vendor:ibmmodel:netezza host managementscope:eqversion:5.3.2.0

Trust: 0.3

vendor:ciscomodel:prime network services controllerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:i v5r3scope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:aspera point to pointscope:eqversion:3.5.5

Trust: 0.3

vendor:ciscomodel:webex messenger servicescope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d55scope:neversion: -

Trust: 0.3

vendor:ibmmodel:netinsightscope:neversion:8.6.0.14

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d11scope: - version: -

Trust: 0.3

vendor:junipermodel:junos d25scope:eqversion:12.1x46

Trust: 0.3

vendor:junipermodel:junos 12.3r3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r7scope: - version: -

Trust: 0.3

vendor:ciscomodel:security managerscope:eqversion:0

Trust: 0.3

vendor:huaweimodel:esight network v300r003c10spc201scope:neversion: -

Trust: 0.3

vendor:oraclemodel:agile engineering data managementscope:eqversion:6.1.3.0

Trust: 0.3

vendor:ciscomodel:socialminerscope:neversion:11.5.1

Trust: 0.3

vendor:junipermodel:junos 14.2r4scope:neversion: -

Trust: 0.3

vendor:oraclemodel:endeca serverscope:eqversion:7.3.0

Trust: 0.3

vendor:ibmmodel:aspera faspex applicationscope:eqversion:3.9.2

Trust: 0.3

vendor:ciscomodel:asa cx and cisco prime security managerscope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d40scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos d25scope:eqversion:12.1x44

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d20scope: - version: -

Trust: 0.3

vendor:ciscomodel:socialminerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:8.1

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:neversion:10.6

Trust: 0.3

vendor:ibmmodel:security appscan enterprisescope:eqversion:9.0

Trust: 0.3

vendor:ciscomodel:model d9485 davic qpskscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.24

Trust: 0.3

vendor:junipermodel:junos d35scope:eqversion:12.1x44

Trust: 0.3

vendor:hpmodel:vcx productsscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:agile engineering data managementscope:eqversion:6.2.0.0

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d45scope:neversion: -

Trust: 0.3

vendor:ciscomodel:nexus series fexscope:eqversion:20000

Trust: 0.3

vendor:oraclemodel:tuxedoscope:eqversion:12.1.1.0

Trust: 0.3

vendor:ibmmodel:security network controller 1.0.3381mscope: - version: -

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:neversion:9.5

Trust: 0.3

vendor:ibmmodel:netezza host managementscope:eqversion:5.3.3

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d40scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d30scope: - version: -

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:neversion:12.2.1

Trust: 0.3

vendor:ibmmodel:rational tau interim fixscope:neversion:4.3.0.6

Trust: 0.3

vendor:ciscomodel:digital media players series 5.4 rbscope:neversion:4300

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d30scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11.17.02scope: - version: -

Trust: 0.3

vendor:ciscomodel:prime security managerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.18-49

Trust: 0.3

vendor:ibmmodel:infosphere information serverscope:eqversion:9.1

Trust: 0.3

vendor:hpmodel:hp-ux b.11.00scope: - version: -

Trust: 0.3

vendor:ciscomodel:virtual security gatewayscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:puredata system for analyticsscope:eqversion:1.0

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.3

vendor:ciscomodel:industrial router 1.2.1rb3scope:neversion:910

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.13-41

Trust: 0.3

vendor:ibmmodel:aspera consolescope:eqversion:3.0.1

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:14.0

Trust: 0.3

vendor:ibmmodel:rational tauscope:eqversion:4.31

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23.07.04scope: - version: -

Trust: 0.3

vendor:ibmmodel:netezza host managementscope:neversion:5.3.7.0

Trust: 0.3

vendor:ciscomodel:unified attendant console standardscope:eqversion:0

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2dscope:neversion: -

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:8.3

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d10scope: - version: -

Trust: 0.3

vendor:oraclemodel:jd edwards enterpriseone toolsscope:eqversion:9.1

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.3381

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.9-34

Trust: 0.3

vendor:ciscomodel:digital media players seriesscope:eqversion:43000

Trust: 0.3

vendor:ibmmodel:security proventia network active bypass 0343c3cscope: - version: -

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.23

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d40scope:neversion: -

Trust: 0.3

vendor:ibmmodel:infosphere information serverscope:eqversion:8.5

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:12.1

Trust: 0.3

vendor:junipermodel:junos 12.3r11scope:neversion: -

Trust: 0.3

vendor:ibmmodel:aspera proxyscope:eqversion:1.2.2

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:worklight consumer editionscope:eqversion:6.1.0.1

Trust: 0.3

vendor:junipermodel:junos 13.3r7scope:neversion: -

Trust: 0.3

vendor:huaweimodel:esight network v300r003c10spc100scope: - version: -

Trust: 0.3

vendor:junipermodel:junosscope:eqversion:12.1x47

Trust: 0.3

vendor:ibmmodel:aspera sharesscope:eqversion:1.9.2

Trust: 0.3

vendor:oraclemodel:solarisscope:eqversion:11.2

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d10scope: - version: -

Trust: 0.3

vendor:oraclemodel:switch es1-24scope:eqversion:1.3

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.3376

Trust: 0.3

vendor:oraclemodel:endeca serverscope:eqversion:7.4

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.18-42

Trust: 0.3

vendor:ibmmodel:worklight enterprise editionscope:eqversion:6.1.0.2

Trust: 0.3

vendor:junipermodel:junos 14.1r5scope: - version: -

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.2.0.4

Trust: 0.3

vendor:ibmmodel:aspera enterprise server clientscope:eqversion:3.5.5

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.1.1

Trust: 0.3

vendor:ibmmodel:worklight foundation consumer editionscope:eqversion:6.2.0.1

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.16

Trust: 0.3

vendor:ibmmodel:aspera ondemandscope:eqversion:3.5.4

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r9scope: - version: -

Trust: 0.3

vendor:ciscomodel:telepresence conductorscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.1

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:1.0.1876

Trust: 0.3

vendor:ciscomodel:digital media players series 5.3 rbscope:neversion:4300

Trust: 0.3

vendor:ibmmodel:worklight enterprise editionscope:eqversion:6.1.0.1

Trust: 0.3

vendor:ciscomodel:connected analytics for collaborationscope:eqversion:0

Trust: 0.3

vendor:hpmodel:cloud service automationscope:eqversion:4.5

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d26scope: - version: -

Trust: 0.3

vendor:ibmmodel:worklight foundation enterprise editionscope:eqversion:6.2.0.1

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11.14.15scope: - version: -

Trust: 0.3

vendor:ciscomodel:webex node for mcsscope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d35.5scope: - version: -

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d30scope:neversion: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2cscope: - version: -

Trust: 0.3

vendor:ibmmodel:rational tauscope:eqversion:4.32

Trust: 0.3

vendor:ciscomodel:virtual security gateway for microsoft hyper-vscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:sun blade ethernet switched nem 24p 10gescope:neversion:60001.2.2.13

Trust: 0.3

vendor:ciscomodel:services analytic platformscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:switch es1-24scope:neversion:1.3.1.3

Trust: 0.3

vendor:ciscomodel:security managerscope:neversion:4.9

Trust: 0.3

vendor:ibmmodel:security network controller 1.0.3376mscope: - version: -

Trust: 0.3

vendor:ibmmodel:infosphere information serverscope:eqversion:8.1

Trust: 0.3

vendor:ibmmodel:rational tauscope:eqversion:4.3

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.3379

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d15scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2bscope: - version: -

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.22

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d36scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d25scope: - version: -

Trust: 0.3

vendor:ciscomodel:network performance analyticsscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:mobilefirst platform foundationscope:eqversion:7.0.0.0

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11.15.13scope: - version: -

Trust: 0.3

vendor:ciscomodel:emergency responderscope: - version: -

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.6

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.0

Trust: 0.3

vendor:ibmmodel:infosphere information serverscope:eqversion:8.7

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d20scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.2r3scope: - version: -

Trust: 0.3

vendor:ciscomodel:model d9485 davic qpskscope:neversion:1.2.19

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:12.1.0.1

Trust: 0.3

vendor:ibmmodel:rational tauscope:eqversion:4.33

Trust: 0.3

vendor:ibmmodel:netezza host managementscope:eqversion:5.3.6.0

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d15scope: - version: -

Trust: 0.3

vendor:oraclemodel:sun network 10ge switch 72pscope:neversion:1.2.2.15

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d15scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d32scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d30scope: - version: -

Trust: 0.3

vendor:ciscomodel:im and presence servicescope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos 12.3r10scope: - version: -

Trust: 0.3

vendor:ciscomodel:digital media players series 5.3 rbscope:neversion:4400

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d15scope: - version: -

Trust: 0.3

sources: BID: 75652 // CNNVD: CNNVD-201505-428 // NVD: CVE-2015-4000

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-4000
value: LOW

Trust: 1.0

CNNVD: CNNVD-201505-428
value: LOW

Trust: 0.6

VULMON: CVE-2015-4000
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-4000
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

nvd@nist.gov: CVE-2015-4000
baseSeverity: LOW
baseScore: 3.7
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 1.4
version: 3.0

Trust: 1.0

sources: VULMON: CVE-2015-4000 // CNNVD: CNNVD-201505-428 // NVD: CVE-2015-4000

PROBLEMTYPE DATA

problemtype:CWE-310

Trust: 1.0

sources: NVD: CVE-2015-4000

THREAT TYPE

remote

Trust: 1.0

sources: PACKETSTORM: 132699 // PACKETSTORM: 132757 // PACKETSTORM: 135172 // PACKETSTORM: 134755 // CNNVD: CNNVD-201505-428

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201505-428

PATCH

title:TLS Fixing measures for protocol encryption problem vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=89458

Trust: 0.6

title:IBM: Security Bulletin: IBM Spectrum Protect Plus vulnerable to Logjam (CVE-2015-4000)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=b088cb485f81aa1e40d469e515f8cc7c

Trust: 0.1

title:IBM: IBM Security Bulletin: Spectrum Protect Operations Center vulnerable to Logjam (CVE-2015-4000)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=9002898279163d9972f239986ab6a5c6

Trust: 0.1

title:IBM: Security Bulletin: IBM Spectrum Protect Backup-Archive Client web user interface, IBM Spectrum Protect for Space Management, and IBM Spectrum Protect for Virtual Environments are vulnerabile to Logjam (CVE-2015-4000)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=b5bf5318623f05f2683ba6f4e835fc5b

Trust: 0.1

title:IBM: Security Bulletin: IBM Spectrum Protect Snapshot for VMware is vulnerable to Logjam (CVE-2015-4000)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=3786c3f564f19ff96adea0022e47fe27

Trust: 0.1

title:Mozilla: NSS accepts export-length DHE keys with regular DHE cipher suitesurl:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=af1e71a1de8256659f6ad0f6663d3bee

Trust: 0.1

title:Mozilla: Mozilla Foundation Security Advisory 2015-70url:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=2015-70

Trust: 0.1

title:Amazon Linux AMI: ALAS-2015-569url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2015-569

Trust: 0.1

title:Citrix Security Bulletins: CVE-2015-4000 - Citrix Security Advisory for DHE_EXPORT TLS Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=84bde745a5fd5d1cca4aceefe7138a6d

Trust: 0.1

title:Ubuntu Security Notice: thunderbird vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2673-1

Trust: 0.1

title:Debian Security Advisories: DSA-3688-1 nss -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=373dcfd6d281e203a1b020510989c2b1

Trust: 0.1

title:Symantec Security Advisories: SA111 : OpenSSL Vulnerabilities 28-Jan-2016url:https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=83d562565218abbdbef42ef8962d127b

Trust: 0.1

title:Amazon Linux AMI: ALAS-2015-550url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2015-550

Trust: 0.1

title:Ubuntu Security Notice: openjdk-7 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2696-1

Trust: 0.1

title:Ubuntu Security Notice: openjdk-6 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2706-1

Trust: 0.1

title:Debian Security Advisories: DSA-3300-1 iceweasel -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=eee46f11209708fd3b15b41452809324

Trust: 0.1

title:Ubuntu Security Notice: firefox vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2656-1

Trust: 0.1

title:Debian Security Advisories: DSA-3339-1 openjdk-6 -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=6c93f875c2194ec5cd3ae93ab207dafa

Trust: 0.1

title:Ubuntu Security Notice: firefox vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2656-2

Trust: 0.1

title:Amazon Linux AMI: ALAS-2015-586url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2015-586

Trust: 0.1

title:Amazon Linux AMI: ALAS-2015-570url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2015-570

Trust: 0.1

title:Symantec Security Advisories: SA98 : OpenSSL Security Advisory 11-June-2015url:https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=a7350b0751124b5a44ba8dbd2df71f9f

Trust: 0.1

title:Debian Security Advisories: DSA-3316-1 openjdk-7 -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=6dadb5ef54390af9161ced1370e85421

Trust: 0.1

title:Amazon Linux AMI: ALAS-2015-571url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2015-571

Trust: 0.1

title:Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - July 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=8b701aba68029ec36b631a8e26157a22

Trust: 0.1

title:Citrix Security Bulletins: Multiple Security Vulnerabilities in Citrix NetScaler Platform IPMI Lights Out Management (LOM) firmwareurl:https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=eb059834b7f24e2562bcf592b6d0afbc

Trust: 0.1

title:Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - January 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=eb439566c9130adc92d21bc093204cf8

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - October 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=744c19dc9f4f70ad58059bf8733ec9c1

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - April 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=122319027ae43d6d626710f1b1bb1d43

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - July 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=459961024c4bdce7bb3a1a40a65a6f2e

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - July 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=3a04485ebb79f7fbc2472bf9af5ce489

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=63802a6c83b107c4e6e0c7f9241a66a8

Trust: 0.1

title:nmap-esentireurl:https://github.com/eSentire/nmap-esentire

Trust: 0.1

title:HAProxy-Keepalived-Sec-HighLoadsurl:https://github.com/fatlan/HAProxy-Keepalived-Sec-HighLoads

Trust: 0.1

title:stuffurl:https://github.com/thekondrashov/stuff

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2015-4000

Trust: 0.1

title: - url:https://github.com/CertifiedCEH/DB

Trust: 0.1

title:Shodan-Browserurl:https://github.com/javirodriguezzz/Shodan-Browser

Trust: 0.1

title:python-ssl-deprecatedurl:https://github.com/yurkao/python-ssl-deprecated

Trust: 0.1

title:a2svurl:https://github.com/84KaliPleXon3/a2sv

Trust: 0.1

title:a2svurl:https://github.com/TheRipperJhon/a2sv

Trust: 0.1

title:Network-Security-2021url:https://github.com/giusepperuggiero96/Network-Security-2021

Trust: 0.1

title:script_a2svurl:https://github.com/F4RM0X/script_a2sv

Trust: 0.1

title:a2svurl:https://github.com/hahwul/a2sv

Trust: 0.1

title:a2svurl:https://github.com/H4CK3RT3CH/a2sv

Trust: 0.1

title:sslscannerurl:https://github.com/fireorb/sslscanner

Trust: 0.1

title:A2SV--SSL-VUL-Scanurl:https://github.com/nyctophile6/A2SV--SSL-VUL-Scan

Trust: 0.1

title:a2svurl:https://github.com/Mre11i0t/a2sv

Trust: 0.1

title:HTTPSScanurl:https://github.com/alexoslabs/HTTPSScan

Trust: 0.1

title: - url:https://github.com/Valdem88/dev-17_ib-yakovlev_vs

Trust: 0.1

sources: VULMON: CVE-2015-4000 // CNNVD: CNNVD-201505-428

EXTERNAL IDS

db:NVDid:CVE-2015-4000

Trust: 2.8

db:SECTRACKid:1033891

Trust: 1.6

db:SECTRACKid:1032932

Trust: 1.6

db:SECTRACKid:1036218

Trust: 1.6

db:SECTRACKid:1033341

Trust: 1.6

db:SECTRACKid:1033513

Trust: 1.6

db:SECTRACKid:1032654

Trust: 1.6

db:SECTRACKid:1032650

Trust: 1.6

db:SECTRACKid:1032649

Trust: 1.6

db:SECTRACKid:1032871

Trust: 1.6

db:SECTRACKid:1032653

Trust: 1.6

db:SECTRACKid:1034728

Trust: 1.6

db:SECTRACKid:1034884

Trust: 1.6

db:SECTRACKid:1033222

Trust: 1.6

db:SECTRACKid:1032699

Trust: 1.6

db:SECTRACKid:1032759

Trust: 1.6

db:SECTRACKid:1033064

Trust: 1.6

db:SECTRACKid:1032476

Trust: 1.6

db:SECTRACKid:1032688

Trust: 1.6

db:SECTRACKid:1040630

Trust: 1.6

db:SECTRACKid:1032645

Trust: 1.6

db:SECTRACKid:1032475

Trust: 1.6

db:SECTRACKid:1032656

Trust: 1.6

db:SECTRACKid:1034087

Trust: 1.6

db:SECTRACKid:1032648

Trust: 1.6

db:SECTRACKid:1033065

Trust: 1.6

db:SECTRACKid:1032856

Trust: 1.6

db:SECTRACKid:1033416

Trust: 1.6

db:SECTRACKid:1032864

Trust: 1.6

db:SECTRACKid:1033208

Trust: 1.6

db:SECTRACKid:1032702

Trust: 1.6

db:SECTRACKid:1033209

Trust: 1.6

db:SECTRACKid:1032655

Trust: 1.6

db:SECTRACKid:1032784

Trust: 1.6

db:SECTRACKid:1033991

Trust: 1.6

db:SECTRACKid:1033430

Trust: 1.6

db:SECTRACKid:1032778

Trust: 1.6

db:SECTRACKid:1032637

Trust: 1.6

db:SECTRACKid:1032884

Trust: 1.6

db:SECTRACKid:1033019

Trust: 1.6

db:SECTRACKid:1032960

Trust: 1.6

db:SECTRACKid:1032651

Trust: 1.6

db:SECTRACKid:1032783

Trust: 1.6

db:SECTRACKid:1032777

Trust: 1.6

db:SECTRACKid:1033760

Trust: 1.6

db:SECTRACKid:1032865

Trust: 1.6

db:SECTRACKid:1032727

Trust: 1.6

db:SECTRACKid:1033385

Trust: 1.6

db:SECTRACKid:1032474

Trust: 1.6

db:SECTRACKid:1033210

Trust: 1.6

db:SECTRACKid:1032652

Trust: 1.6

db:SECTRACKid:1032647

Trust: 1.6

db:SECTRACKid:1033433

Trust: 1.6

db:SECTRACKid:1033067

Trust: 1.6

db:SECTRACKid:1032910

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2015/05/20/8

Trust: 1.6

db:SIEMENSid:SSA-412672

Trust: 1.6

db:JUNIPERid:JSA10681

Trust: 1.6

db:JUNIPERid:JSA10727

Trust: 1.6

db:BIDid:91787

Trust: 1.6

db:BIDid:74733

Trust: 1.6

db:MCAFEEid:SB10122

Trust: 1.6

db:AUSCERTid:ESB-2022.0696

Trust: 0.6

db:AUSCERTid:ESB-2019.3475

Trust: 0.6

db:AUSCERTid:ESB-2023.1333

Trust: 0.6

db:CNNVDid:CNNVD-201505-428

Trust: 0.6

db:JUNIPERid:JSA10694

Trust: 0.3

db:BIDid:75652

Trust: 0.3

db:VULMONid:CVE-2015-4000

Trust: 0.1

db:PACKETSTORMid:135510

Trust: 0.1

db:PACKETSTORMid:132699

Trust: 0.1

db:PACKETSTORMid:132757

Trust: 0.1

db:PACKETSTORMid:132894

Trust: 0.1

db:PACKETSTORMid:135172

Trust: 0.1

db:PACKETSTORMid:132989

Trust: 0.1

db:PACKETSTORMid:134755

Trust: 0.1

db:PACKETSTORMid:132439

Trust: 0.1

sources: VULMON: CVE-2015-4000 // BID: 75652 // PACKETSTORM: 135510 // PACKETSTORM: 132699 // PACKETSTORM: 132757 // PACKETSTORM: 132894 // PACKETSTORM: 135172 // PACKETSTORM: 132989 // PACKETSTORM: 134755 // PACKETSTORM: 132439 // CNNVD: CNNVD-201505-428 // NVD: CVE-2015-4000

REFERENCES

url:https://www.oracle.com/security-alerts/cpujan2021.html

Trust: 2.2

url:http://support.citrix.com/article/ctx201114

Trust: 2.2

url:http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

Trust: 1.9

url:http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html

Trust: 1.9

url:http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html

Trust: 1.9

url:http://www.ubuntu.com/usn/usn-2656-2

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-2656-1

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-2673-1

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-2696-1

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-2706-1

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2015-1185.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-updates/2016-02/msg00097.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032960

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959636

Trust: 1.6

url:http://www.securitytracker.com/id/1033019

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959517

Trust: 1.6

url:http://www.securitytracker.com/id/1032727

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144102017024820&w=2

Trust: 1.6

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04953655

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21959132

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21960191

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21961717

Trust: 1.6

url:http://lists.apple.com/archives/security-announce/2015/jun/msg00002.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1197.html

Trust: 1.6

url:http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html

Trust: 1.6

url:http://www.securitytracker.com/id/1033385

Trust: 1.6

url:http://www.securitytracker.com/id/1032856

Trust: 1.6

url:http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc

Trust: 1.6

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05128722

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html

Trust: 1.6

url:http://www.securityfocus.com/bid/91787

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html

Trust: 1.6

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-june/159351.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959530

Trust: 1.6

url:https://openssl.org/news/secadv/20150611.txt

Trust: 1.6

url:http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032702

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04772190

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143637549705650&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144060576831314&w=2

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1072.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1241.html

Trust: 1.6

url:https://weakdh.org/imperfect-forward-secrecy.pdf

Trust: 1.6

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10681

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21958984

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143506486712441&w=2

Trust: 1.6

url:https://developer.mozilla.org/en-us/docs/mozilla/projects/nss/nss_3.19.1_release_notes

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21960380

Trust: 1.6

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbhf03831en_us

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144043644216842&w=2

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959195

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144050121701297&w=2

Trust: 1.6

url:http://www.securityfocus.com/bid/74733

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html

Trust: 1.6

url:http://www.debian.org/security/2015/dsa-3300

Trust: 1.6

url:http://www.securitytracker.com/id/1033222

Trust: 1.6

url:http://www.securitytracker.com/id/1033341

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=145409266329539&w=2

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959325

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html

Trust: 1.6

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10122

Trust: 1.6

url:http://www.securitytracker.com/id/1032932

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143880121627664&w=2

Trust: 1.6

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05193083

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1488.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1229.html

Trust: 1.6

url:http://www.debian.org/security/2015/dsa-3316

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1242.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21962739

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04926789

Trust: 1.6

url:http://lists.opensuse.org/opensuse-updates/2015-07/msg00016.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959453

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html

Trust: 1.6

url:https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/

Trust: 1.6

url:http://www.securitytracker.com/id/1033433

Trust: 1.6

url:http://www.securitytracker.com/id/1034884

Trust: 1.6

url:http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959539

Trust: 1.6

url:https://security.gentoo.org/glsa/201603-11

Trust: 1.6

url:https://www.openssl.org/news/secadv_20150611.txt

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144104533800819&w=2

Trust: 1.6

url:http://openwall.com/lists/oss-security/2015/05/20/8

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21967893

Trust: 1.6

url:http://www.debian.org/security/2015/dsa-3324

Trust: 1.6

url:http://www.securitytracker.com/id/1032474

Trust: 1.6

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04876402

Trust: 1.6

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-june/160117.html

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144060606031437&w=2

Trust: 1.6

url:http://www.securitytracker.com/id/1032476

Trust: 1.6

url:http://www.securitytracker.com/id/1032475

Trust: 1.6

url:http://www.securitytracker.com/id/1033208

Trust: 1.6

url:http://www.securitytracker.com/id/1032910

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04923929

Trust: 1.6

url:http://www.securitytracker.com/id/1033209

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1243.html

Trust: 1.6

url:https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04718196

Trust: 1.6

url:https://security.gentoo.org/glsa/201701-46

Trust: 1.6

url:http://www.debian.org/security/2015/dsa-3339

Trust: 1.6

url:http://www.securitytracker.com/id/1033210

Trust: 1.6

url:http://www.securitytracker.com/id/1033416

Trust: 1.6

url:http://www.securitytracker.com/id/1032688

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21962816

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144061542602287&w=2

Trust: 1.6

url:http://lists.apple.com/archives/security-announce/2015/jun/msg00001.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959481

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04770140

Trust: 1.6

url:https://support.citrix.com/article/ctx216642

Trust: 1.6

url:http://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2015-008.txt.asc

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1485.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032699

Trust: 1.6

url:http://www.mozilla.org/security/announce/2015/mfsa2015-70.html

Trust: 1.6

url:http://www.solarwinds.com/documentation/storage/storagemanager/docs/releasenotes/releasenotes.htm

Trust: 1.6

url:http://support.apple.com/kb/ht204941

Trust: 1.6

url:http://support.apple.com/kb/ht204942

Trust: 1.6

url:http://www.securitytracker.com/id/1040630

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1604.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html

Trust: 1.6

url:https://bto.bluecoat.com/security-advisory/sa98

Trust: 1.6

url:http://www.securitytracker.com/id/1033430

Trust: 1.6

url:http://www.securitytracker.com/id/1034087

Trust: 1.6

url:http://lists.opensuse.org/opensuse-updates/2016-02/msg00094.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032784

Trust: 1.6

url:https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf

Trust: 1.6

url:http://www.securitytracker.com/id/1032783

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html

Trust: 1.6

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10727

Trust: 1.6

url:http://www.securitytracker.com/id/1033513

Trust: 1.6

url:http://www.securitytracker.com/id/1034728

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21960418

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04918839

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html

Trust: 1.6

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-june/159314.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2016-2056.html

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144493176821532&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143628304012255&w=2

Trust: 1.6

url:http://www.securitytracker.com/id/1033760

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html

Trust: 1.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21959745

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143655800220052&w=2

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959111

Trust: 1.6

url:http://www.securitytracker.com/id/1033891

Trust: 1.6

url:https://www.suse.com/security/cve/cve-2015-4000.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1228.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032884

Trust: 1.6

url:http://www.debian.org/security/2016/dsa-3688

Trust: 1.6

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04740527

Trust: 1.6

url:https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/

Trust: 1.6

url:http://www.securitytracker.com/id/1032647

Trust: 1.6

url:http://www.securitytracker.com/id/1032645

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1230.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032649

Trust: 1.6

url:http://www.securitytracker.com/id/1032648

Trust: 1.6

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098403

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143557934009303&w=2

Trust: 1.6

url:http://www.securitytracker.com/id/1033064

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1544.html

Trust: 1.6

url:http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032650

Trust: 1.6

url:http://www.securitytracker.com/id/1033067

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21960041

Trust: 1.6

url:https://security.gentoo.org/glsa/201512-10

Trust: 1.6

url:https://puppet.com/security/cve/cve-2015-4000

Trust: 1.6

url:http://www.securitytracker.com/id/1033065

Trust: 1.6

url:http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032654

Trust: 1.6

url:http://www.securitytracker.com/id/1032653

Trust: 1.6

url:http://www.securitytracker.com/id/1032652

Trust: 1.6

url:http://www.securitytracker.com/id/1032651

Trust: 1.6

url:http://www.securitytracker.com/id/1032778

Trust: 1.6

url:http://www.securitytracker.com/id/1032656

Trust: 1.6

url:http://www.securitytracker.com/id/1032777

Trust: 1.6

url:http://www.securitytracker.com/id/1036218

Trust: 1.6

url:http://www.securitytracker.com/id/1032655

Trust: 1.6

url:https://security.gentoo.org/glsa/201506-02

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21962455

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2016-1624.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04832246

Trust: 1.6

url:http://www.securitytracker.com/id/1033991

Trust: 1.6

url:https://security.netapp.com/advisory/ntap-20150619-0001/

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144069189622016&w=2

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959812

Trust: 1.6

url:http://www.securitytracker.com/id/1032865

Trust: 1.6

url:http://www.securitytracker.com/id/1032864

Trust: 1.6

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05045763

Trust: 1.6

url:http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html

Trust: 1.6

url:https://bugzilla.mozilla.org/show_bug.cgi?id=1138554

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773119

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1486.html

Trust: 1.6

url:http://www.debian.org/security/2015/dsa-3287

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143558092609708&w=2

Trust: 1.6

url:http://www.securitytracker.com/id/1032871

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html

Trust: 1.6

url:https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes

Trust: 1.6

url:http://www.securitytracker.com/id/1032759

Trust: 1.6

url:http://www.securitytracker.com/id/1032637

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html

Trust: 1.6

url:http://www.fortiguard.com/advisory/2015-05-20-logjam-attack

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1526.html

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21960194

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773241

Trust: 1.6

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04949778

Trust: 1.6

url:https://weakdh.org/

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2015-4000

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2022.0696

Trust: 0.6

url:https://www.ibm.com/support/docview.wss?uid=ibm11073000

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1333

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-spectrum-protect-backup-archive-client-web-user-interface-ibm-spectrum-protect-for-space-management-and-ibm-spectrum-protect-for-virtual-environments-are-vulnerabile-to-logjam/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-spectrum-protect-plus-vulnerable-to-logjam-cve-2015-4000/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.3475/

Trust: 0.6

url:https://mta.openssl.org/pipermail/openssl-announce/2015-july/000037.html

Trust: 0.3

url:http://openssl.org/

Trust: 0.3

url:https://support.asperasoft.com/entries/94843988-security-bulletin-openssl-,-tls-vulnerabilities-logjam-cve-2015-4000

Trust: 0.3

url:http://seclists.org/bugtraq/2015/aug/13

Trust: 0.3

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10694

Trust: 0.3

url:https://www.openssl.org/news/secadv_20150709.txt

Trust: 0.3

url:http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html

Trust: 0.3

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04822825

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05184351

Trust: 0.3

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150710-openssl

Trust: 0.3

url:http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-454058.htm

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21962519

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21964231

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21965399

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=nas8n1020840

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21961179

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21962398

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21962929

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21963448

Trust: 0.3

url:https://www.openssl.org/news/vulnerabilities.html#2015-1793

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21963498

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21966481

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21966484

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21965725

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21965807

Trust: 0.3

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.3

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-2808

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-2740

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2737

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2721

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2739

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2734

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2724

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2735

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2736

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2738

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-4732

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2628

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-4760

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2601

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2632

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2621

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2625

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2613

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2590

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-4733

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-4749

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-4731

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-4748

Trust: 0.2

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n

Trust: 0.2

url:https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2733

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2728

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2730

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/firefox/39.0+build5-0ubuntu0.12.04.2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2727

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2725

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2731

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2741

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2726

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2722

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2729

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2743

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/thunderbird/1:31.8.0+build1-0ubuntu0.15.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/thunderbird/1:31.8.0+build1-0ubuntu0.14.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/thunderbird/1:31.8.0+build1-0ubuntu0.12.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/thunderbird/1:31.8.0+build1-0ubuntu0.14.10.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-7/7u79-2.5.6-0ubuntu1.14.04.1

Trust: 0.1

url:https://wiki.ubuntu.com/securityteam/knowledgebase/logjam

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-7/7u79-2.5.6-0ubuntu1.15.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3183

Trust: 0.1

url:https://www.hp.com/go/swa

Trust: 0.1

url:https://h20392.www2.hpe.com/portal/swdepot/displayproductinfo.do?productnumbe

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04832246

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-6/6b36-1.13.8-0ubuntu1~12.04

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4000

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

sources: BID: 75652 // PACKETSTORM: 135510 // PACKETSTORM: 132699 // PACKETSTORM: 132757 // PACKETSTORM: 132894 // PACKETSTORM: 135172 // PACKETSTORM: 132989 // PACKETSTORM: 134755 // PACKETSTORM: 132439 // CNNVD: CNNVD-201505-428 // NVD: CVE-2015-4000

CREDITS

Ubuntu

Trust: 0.4

sources: PACKETSTORM: 132699 // PACKETSTORM: 132757 // PACKETSTORM: 132894 // PACKETSTORM: 132989

SOURCES

db:VULMONid:CVE-2015-4000
db:BIDid:75652
db:PACKETSTORMid:135510
db:PACKETSTORMid:132699
db:PACKETSTORMid:132757
db:PACKETSTORMid:132894
db:PACKETSTORMid:135172
db:PACKETSTORMid:132989
db:PACKETSTORMid:134755
db:PACKETSTORMid:132439
db:CNNVDid:CNNVD-201505-428
db:NVDid:CVE-2015-4000

LAST UPDATE DATE

2025-04-28T22:56:22.183000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2015-4000date:2023-02-09T00:00:00
db:BIDid:75652date:2016-10-26T05:10:00
db:CNNVDid:CNNVD-201505-428date:2023-03-03T00:00:00
db:NVDid:CVE-2015-4000date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULMONid:CVE-2015-4000date:2015-05-21T00:00:00
db:BIDid:75652date:2015-07-09T00:00:00
db:PACKETSTORMid:135510date:2016-01-29T20:33:00
db:PACKETSTORMid:132699date:2015-07-16T17:45:50
db:PACKETSTORMid:132757date:2015-07-20T22:55:34
db:PACKETSTORMid:132894date:2015-08-03T01:14:40
db:PACKETSTORMid:135172date:2016-01-08T15:12:14
db:PACKETSTORMid:132989date:2015-08-07T04:04:00
db:PACKETSTORMid:134755date:2015-12-10T17:24:11
db:PACKETSTORMid:132439date:2015-06-25T14:18:03
db:CNNVDid:CNNVD-201505-428date:2015-05-21T00:00:00
db:NVDid:CVE-2015-4000date:2015-05-21T00:59:00.087