ID

VAR-201505-0233


CVE

CVE-2015-4000


TITLE

TLS Encryption problem vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-201505-428

DESCRIPTION

The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue. TLS (full name Transport Layer Security, Secure Transport Layer Protocol) is a set of protocols used to provide confidentiality and data integrity between two communication applications. There is a security vulnerability in the TLS protocol 1.2 and earlier versions. The vulnerability comes from that when the server enables the DHE_EXPORT cipher suite, the program does not pass the DHE_EXPORT option correctly. Attackers can exploit this vulnerability to implement man-in-the-middle attacks and cipher-downgrade attacks by rewriting ClientHello (use DHE_EXPORT instead of DHE) and then rewrite ServerHello (use DHE instead of DHE_EXPORT). For the oldstable distribution (wheezy), these problems have been fixed in version 6b36-1.13.8-1~deb7u1. Release Date: 2015-08-05 Last Updated: 2015-08-05 Potential Security Impact: Remote disclosure of information Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP-UX running OpenSSL with SSL/TLS enabled. This is the TLS vulnerability using US export-grade 512-bit keys in Diffie-Hellman key exchange known as Logjam which could be exploited remotely resulting in disclosure of information. References: CVE-2015-4000: DHE man-in-the-middle protection (Logjam). CVE-2015-1788: Malformed ECParameters causes infinite loop. CVE-2015-1789: Exploitable out-of-bounds read in X509_cmp_time. CVE-2015-1790: PKCS7 crash with missing EnvelopedContent CVE-2015-1791: Race condition handling NewSessionTicket CVE-2015-1792: CMS verify infinite loop with unknown hash function CVE-2015-1793: Alternative Chain Certificate Forgery. SSRT102180 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.31 running OpenSSL 1.0.1m or earlier. BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2015-4000 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2015-1788 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2015-1789 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2015-1790 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-1791 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2015-1792 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-1793 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has provided an updated version of OpenSSL to resolve this vulnerability. A new B.11.31 depot for OpenSSL_A.01.00.01p is available here: https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber =OPENSSL11I MANUAL ACTIONS: Yes - Update PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa The following text is for use by the HP-UX Software Assistant. AFFECTED VERSIONS HP-UX B.11.31 ================== openssl.OPENSSL-CER openssl.OPENSSL-CONF openssl.OPENSSL-DOC openssl.OPENSSL-INC openssl.OPENSSL-LIB openssl.OPENSSL-MAN openssl.OPENSSL-MIS openssl.OPENSSL-PRNG openssl.OPENSSL-PVT openssl.OPENSSL-RUN openssl.OPENSSL-SRC action: install revision A.01.00.01p or subsequent END AFFECTED VERSIONS HISTORY Version:1 (rev.1) - 5 August 2015 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS) and other impacts including... HP BSM Connector (BSMC) v9.20, v9.21, v9.22, v9.23, and v10.00. Customers unable to apply the update should contact HPE Support to discuss options. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: java-1.7.0-openjdk security update Advisory ID: RHSA-2015:1229-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1229.html Issue date: 2015-07-15 CVE Names: CVE-2015-2590 CVE-2015-2601 CVE-2015-2621 CVE-2015-2625 CVE-2015-2628 CVE-2015-2632 CVE-2015-2808 CVE-2015-4000 CVE-2015-4731 CVE-2015-4732 CVE-2015-4733 CVE-2015-4748 CVE-2015-4749 CVE-2015-4760 ===================================================================== 1. Summary: Updated java-1.7.0-openjdk packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64 3. Description: The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. Multiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. (CVE-2015-4760, CVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733) A flaw was found in the way the Libraries component of OpenJDK verified Online Certificate Status Protocol (OCSP) responses. An OCSP response with no nextUpdate date specified was incorrectly handled as having unlimited validity, possibly causing a revoked X.509 certificate to be interpreted as valid. (CVE-2015-4748) It was discovered that the JCE component in OpenJDK failed to use constant time comparisons in multiple cases. An attacker could possibly use these flaws to disclose sensitive information by measuring the time used to perform operations using these non-constant time comparisons. (CVE-2015-2601) A flaw was found in the RC4 encryption algorithm. When using certain keys for RC4 encryption, an attacker could obtain portions of the plain text from the cipher text without the knowledge of the encryption key. (CVE-2015-2808) Note: With this update, OpenJDK now disables RC4 TLS/SSL cipher suites by default to address the CVE-2015-2808 issue. Refer to Red Hat Bugzilla bug 1207101, linked to in the References section, for additional details about this change. A flaw was found in the way the TLS protocol composed the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. (CVE-2015-4000) Note: This update forces the TLS/SSL client implementation in OpenJDK to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Refer to Red Hat Bugzilla bug 1223211, linked to in the References section, for additional details about this change. It was discovered that the JNDI component in OpenJDK did not handle DNS resolutions correctly. An attacker able to trigger such DNS errors could cause a Java application using JNDI to consume memory and CPU time, and possibly block further DNS resolution. (CVE-2015-4749) Multiple information leak flaws were found in the JMX and 2D components in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-2621, CVE-2015-2632) A flaw was found in the way the JSSE component in OpenJDK performed X.509 certificate identity verification when establishing a TLS/SSL connection to a host identified by an IP address. In certain cases, the certificate was accepted as valid if it was issued for a host name to which the IP address resolves rather than for the IP address. (CVE-2015-2625) Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. All users of java-1.7.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1207101 - CVE-2015-2808 SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher 1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks 1241965 - CVE-2015-2625 OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) 1242019 - CVE-2015-2601 OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) 1242232 - CVE-2015-2628 OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376) 1242234 - CVE-2015-4731 OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) 1242240 - CVE-2015-4732 OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) 1242275 - CVE-2015-4733 OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) 1242281 - CVE-2015-4748 OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) 1242372 - CVE-2015-2621 OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) 1242379 - CVE-2015-4749 OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) 1242394 - CVE-2015-2632 ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) 1242447 - CVE-2015-4760 ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715) 1243139 - CVE-2015-2590 OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401) 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm i386: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.i686.rpm x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.i686.rpm noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el6_6.noarch.rpm x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el6_6.noarch.rpm x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm i386: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.i686.rpm x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.i686.rpm noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el6_6.noarch.rpm x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.src.rpm i386: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.i686.rpm x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.i686.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.i686.rpm noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el6_6.noarch.rpm x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_6.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.src.rpm x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1.noarch.rpm x86_64: java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.src.rpm x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1.noarch.rpm x86_64: java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.src.rpm ppc64: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm s390x: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.s390x.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.s390x.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.s390x.rpm java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.s390x.rpm x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.ael7b_1.src.rpm ppc64le: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Server Optional (v. 7): noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1.noarch.rpm ppc64: java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.ppc64.rpm s390x: java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.s390x.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.s390x.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.s390x.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.s390x.rpm x86_64: java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.ael7b_1.noarch.rpm ppc64le: java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.src.rpm x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): noarch: java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1.noarch.rpm x86_64: java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-2590 https://access.redhat.com/security/cve/CVE-2015-2601 https://access.redhat.com/security/cve/CVE-2015-2621 https://access.redhat.com/security/cve/CVE-2015-2625 https://access.redhat.com/security/cve/CVE-2015-2628 https://access.redhat.com/security/cve/CVE-2015-2632 https://access.redhat.com/security/cve/CVE-2015-2808 https://access.redhat.com/security/cve/CVE-2015-4000 https://access.redhat.com/security/cve/CVE-2015-4731 https://access.redhat.com/security/cve/CVE-2015-4732 https://access.redhat.com/security/cve/CVE-2015-4733 https://access.redhat.com/security/cve/CVE-2015-4748 https://access.redhat.com/security/cve/CVE-2015-4749 https://access.redhat.com/security/cve/CVE-2015-4760 https://access.redhat.com/security/updates/classification/#critical https://bugzilla.redhat.com/show_bug.cgi?id=1207101#c11 https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVpliAXlSAg2UNWIIRAmDIAKC0SKJPEBiUrI0sgDcQMZTM/nm7nwCfUIje QU57Hj/UGZeY+OmKchPFPcI= =miFC -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Note: This vulnerability is in the TLS protocol and not specific to HP Project and Portfolio Management Center

Trust: 1.71

sources: NVD: CVE-2015-4000 // VULHUB: VHN-81961 // PACKETSTORM: 133234 // PACKETSTORM: 132973 // PACKETSTORM: 133990 // PACKETSTORM: 133336 // PACKETSTORM: 136247 // PACKETSTORM: 132697 // PACKETSTORM: 132413 // PACKETSTORM: 134232

AFFECTED PRODUCTS

vendor:mozillamodel:firefox osscope:eqversion:2.2

Trust: 1.6

vendor:mozillamodel:firefox esrscope:eqversion:31.8

Trust: 1.6

vendor:mozillamodel:thunderbirdscope:eqversion:31.8

Trust: 1.6

vendor:mozillamodel:thunderbirdscope:eqversion:38.1

Trust: 1.6

vendor:mozillamodel:seamonkeyscope:eqversion:2.35

Trust: 1.6

vendor:mozillamodel:firefoxscope:eqversion:39.0

Trust: 1.6

vendor:oraclemodel:jrockitscope:eqversion:r28.3.6

Trust: 1.0

vendor:oraclemodel:sparc-opl service processorscope:lteversion:1121

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.6.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.10

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:hpmodel:hp-uxscope:eqversion:b.11.31

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:12

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.0.2

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.19

Trust: 1.0

vendor:applemodel:iphone osscope:lteversion:8.3

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:38.1.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:15.04

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.8.0

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.7.0

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.6.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.8.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion: -

Trust: 1.0

vendor:opensslmodel:opensslscope:lteversion:1.0.2a

Trust: 1.0

vendor:applemodel:mac os xscope:lteversion:10.10.3

Trust: 1.0

vendor:opensslmodel:opensslscope:lteversion:1.0.1m

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.7.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.0.1

Trust: 1.0

vendor:microsoftmodel:internet explorerscope:eqversion: -

Trust: 1.0

vendor:googlemodel:chromescope:eqversion: -

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion: -

Trust: 1.0

vendor:ibmmodel:content managerscope:eqversion:8.5

Trust: 1.0

vendor:susemodel:linux enterprise software development kitscope:eqversion:12

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:11.0

Trust: 1.0

vendor:operamodel:browserscope:eqversion: -

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:12

Trust: 1.0

vendor:mozillamodel:firefox esrscope:eqversion:38.1.0

Trust: 0.6

sources: CNNVD: CNNVD-201505-428 // NVD: CVE-2015-4000

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-4000
value: LOW

Trust: 1.0

CNNVD: CNNVD-201505-428
value: LOW

Trust: 0.6

VULHUB: VHN-81961
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-4000
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-81961
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-4000
baseSeverity: LOW
baseScore: 3.7
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 1.4
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-81961 // CNNVD: CNNVD-201505-428 // NVD: CVE-2015-4000

PROBLEMTYPE DATA

problemtype:CWE-310

Trust: 1.1

sources: VULHUB: VHN-81961 // NVD: CVE-2015-4000

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201505-428

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201505-428

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-81961

PATCH

title:TLS Fixing measures for protocol encryption problem vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=89458

Trust: 0.6

sources: CNNVD: CNNVD-201505-428

EXTERNAL IDS

db:NVDid:CVE-2015-4000

Trust: 2.5

db:SECTRACKid:1032864

Trust: 1.7

db:SECTRACKid:1033341

Trust: 1.7

db:SECTRACKid:1032777

Trust: 1.7

db:SECTRACKid:1032727

Trust: 1.7

db:SECTRACKid:1032871

Trust: 1.7

db:SECTRACKid:1032475

Trust: 1.7

db:SECTRACKid:1032783

Trust: 1.7

db:SECTRACKid:1032653

Trust: 1.7

db:SECTRACKid:1032702

Trust: 1.7

db:SECTRACKid:1033222

Trust: 1.7

db:SECTRACKid:1032865

Trust: 1.7

db:SECTRACKid:1033065

Trust: 1.7

db:SECTRACKid:1033208

Trust: 1.7

db:SECTRACKid:1033019

Trust: 1.7

db:SECTRACKid:1033991

Trust: 1.7

db:SECTRACKid:1032759

Trust: 1.7

db:SECTRACKid:1040630

Trust: 1.7

db:SECTRACKid:1032910

Trust: 1.7

db:SECTRACKid:1033067

Trust: 1.7

db:SECTRACKid:1032637

Trust: 1.7

db:SECTRACKid:1033064

Trust: 1.7

db:SECTRACKid:1032654

Trust: 1.7

db:SECTRACKid:1032656

Trust: 1.7

db:SECTRACKid:1034087

Trust: 1.7

db:SECTRACKid:1032932

Trust: 1.7

db:SECTRACKid:1033385

Trust: 1.7

db:SECTRACKid:1032652

Trust: 1.7

db:SECTRACKid:1032688

Trust: 1.7

db:SECTRACKid:1032699

Trust: 1.7

db:SECTRACKid:1032649

Trust: 1.7

db:SECTRACKid:1032960

Trust: 1.7

db:SECTRACKid:1032647

Trust: 1.7

db:SECTRACKid:1032474

Trust: 1.7

db:SECTRACKid:1033210

Trust: 1.7

db:SECTRACKid:1032778

Trust: 1.7

db:SECTRACKid:1033416

Trust: 1.7

db:SECTRACKid:1033891

Trust: 1.7

db:SECTRACKid:1032884

Trust: 1.7

db:SECTRACKid:1032651

Trust: 1.7

db:SECTRACKid:1033760

Trust: 1.7

db:SECTRACKid:1033433

Trust: 1.7

db:SECTRACKid:1032476

Trust: 1.7

db:SECTRACKid:1032784

Trust: 1.7

db:SECTRACKid:1036218

Trust: 1.7

db:SECTRACKid:1032856

Trust: 1.7

db:SECTRACKid:1033430

Trust: 1.7

db:SECTRACKid:1034884

Trust: 1.7

db:SECTRACKid:1032655

Trust: 1.7

db:SECTRACKid:1032650

Trust: 1.7

db:SECTRACKid:1032648

Trust: 1.7

db:SECTRACKid:1033513

Trust: 1.7

db:SECTRACKid:1033209

Trust: 1.7

db:SECTRACKid:1032645

Trust: 1.7

db:SECTRACKid:1034728

Trust: 1.7

db:JUNIPERid:JSA10681

Trust: 1.7

db:JUNIPERid:JSA10727

Trust: 1.7

db:BIDid:91787

Trust: 1.7

db:BIDid:74733

Trust: 1.7

db:MCAFEEid:SB10122

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2015/05/20/8

Trust: 1.7

db:SIEMENSid:SSA-412672

Trust: 1.7

db:CNNVDid:CNNVD-201505-428

Trust: 0.7

db:AUSCERTid:ESB-2022.0696

Trust: 0.6

db:AUSCERTid:ESB-2019.3475

Trust: 0.6

db:AUSCERTid:ESB-2023.1333

Trust: 0.6

db:PACKETSTORMid:132413

Trust: 0.2

db:PACKETSTORMid:136247

Trust: 0.2

db:PACKETSTORMid:134232

Trust: 0.2

db:PACKETSTORMid:132649

Trust: 0.1

db:PACKETSTORMid:132586

Trust: 0.1

db:PACKETSTORMid:132164

Trust: 0.1

db:PACKETSTORMid:132610

Trust: 0.1

db:PACKETSTORMid:135506

Trust: 0.1

db:PACKETSTORMid:137744

Trust: 0.1

db:PACKETSTORMid:132439

Trust: 0.1

db:PACKETSTORMid:132652

Trust: 0.1

db:PACKETSTORMid:139002

Trust: 0.1

db:PACKETSTORMid:135510

Trust: 0.1

db:PACKETSTORMid:132465

Trust: 0.1

db:PACKETSTORMid:133338

Trust: 0.1

db:PACKETSTORMid:132468

Trust: 0.1

db:PACKETSTORMid:134902

Trust: 0.1

db:PACKETSTORMid:133324

Trust: 0.1

db:PACKETSTORMid:136975

Trust: 0.1

db:PACKETSTORMid:134755

Trust: 0.1

db:VULHUBid:VHN-81961

Trust: 0.1

db:PACKETSTORMid:133234

Trust: 0.1

db:PACKETSTORMid:132973

Trust: 0.1

db:PACKETSTORMid:133990

Trust: 0.1

db:PACKETSTORMid:133336

Trust: 0.1

db:PACKETSTORMid:132697

Trust: 0.1

sources: VULHUB: VHN-81961 // PACKETSTORM: 133234 // PACKETSTORM: 132973 // PACKETSTORM: 133990 // PACKETSTORM: 133336 // PACKETSTORM: 136247 // PACKETSTORM: 132697 // PACKETSTORM: 132413 // PACKETSTORM: 134232 // CNNVD: CNNVD-201505-428 // NVD: CVE-2015-4000

REFERENCES

url:http://support.citrix.com/article/ctx201114

Trust: 2.3

url:https://www.oracle.com/security-alerts/cpujan2021.html

Trust: 2.3

url:http://rhn.redhat.com/errata/rhsa-2015-1229.html

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2015/jun/msg00001.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2015/jun/msg00002.html

Trust: 1.7

url:http://www.securityfocus.com/bid/74733

Trust: 1.7

url:http://www.securityfocus.com/bid/91787

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf

Trust: 1.7

url:http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc

Trust: 1.7

url:http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery

Trust: 1.7

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04876402

Trust: 1.7

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04949778

Trust: 1.7

url:http://support.apple.com/kb/ht204941

Trust: 1.7

url:http://support.apple.com/kb/ht204942

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959111

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959195

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959325

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959453

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959481

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959517

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959530

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959539

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959636

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959812

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg21960191

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg21961717

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg21962455

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg21962739

Trust: 1.7

url:http://www-304.ibm.com/support/docview.wss?uid=swg21958984

Trust: 1.7

url:http://www-304.ibm.com/support/docview.wss?uid=swg21959132

Trust: 1.7

url:http://www-304.ibm.com/support/docview.wss?uid=swg21960041

Trust: 1.7

url:http://www-304.ibm.com/support/docview.wss?uid=swg21960194

Trust: 1.7

url:http://www-304.ibm.com/support/docview.wss?uid=swg21960380

Trust: 1.7

url:http://www-304.ibm.com/support/docview.wss?uid=swg21960418

Trust: 1.7

url:http://www-304.ibm.com/support/docview.wss?uid=swg21962816

Trust: 1.7

url:http://www-304.ibm.com/support/docview.wss?uid=swg21967893

Trust: 1.7

url:http://www.fortiguard.com/advisory/2015-05-20-logjam-attack

Trust: 1.7

url:http://www.mozilla.org/security/announce/2015/mfsa2015-70.html

Trust: 1.7

url:http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html

Trust: 1.7

url:http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

Trust: 1.7

url:http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html

Trust: 1.7

url:http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html

Trust: 1.7

url:http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html

Trust: 1.7

url:http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html

Trust: 1.7

url:http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html

Trust: 1.7

url:http://www.solarwinds.com/documentation/storage/storagemanager/docs/releasenotes/releasenotes.htm

Trust: 1.7

url:https://bto.bluecoat.com/security-advisory/sa98

Trust: 1.7

url:https://bugzilla.mozilla.org/show_bug.cgi?id=1138554

Trust: 1.7

url:https://developer.mozilla.org/en-us/docs/mozilla/projects/nss/nss_3.19.1_release_notes

Trust: 1.7

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04770140

Trust: 1.7

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04772190

Trust: 1.7

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773119

Trust: 1.7

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773241

Trust: 1.7

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04832246

Trust: 1.7

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04918839

Trust: 1.7

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04923929

Trust: 1.7

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04926789

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04740527

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04953655

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05045763

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05128722

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05193083

Trust: 1.7

url:https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes

Trust: 1.7

url:https://openssl.org/news/secadv/20150611.txt

Trust: 1.7

url:https://puppet.com/security/cve/cve-2015-4000

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20150619-0001/

Trust: 1.7

url:https://support.citrix.com/article/ctx216642

Trust: 1.7

url:https://www-304.ibm.com/support/docview.wss?uid=swg21959745

Trust: 1.7

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098403

Trust: 1.7

url:https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/

Trust: 1.7

url:https://www.openssl.org/news/secadv_20150611.txt

Trust: 1.7

url:https://www.suse.com/security/cve/cve-2015-4000.html

Trust: 1.7

url:http://www.debian.org/security/2015/dsa-3287

Trust: 1.7

url:http://www.debian.org/security/2015/dsa-3300

Trust: 1.7

url:http://www.debian.org/security/2015/dsa-3316

Trust: 1.7

url:http://www.debian.org/security/2015/dsa-3324

Trust: 1.7

url:http://www.debian.org/security/2015/dsa-3339

Trust: 1.7

url:http://www.debian.org/security/2016/dsa-3688

Trust: 1.7

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-june/159351.html

Trust: 1.7

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-june/159314.html

Trust: 1.7

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-june/160117.html

Trust: 1.7

url:https://security.gentoo.org/glsa/201506-02

Trust: 1.7

url:https://security.gentoo.org/glsa/201512-10

Trust: 1.7

url:https://security.gentoo.org/glsa/201603-11

Trust: 1.7

url:https://security.gentoo.org/glsa/201701-46

Trust: 1.7

url:https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04718196

Trust: 1.7

url:https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/

Trust: 1.7

url:https://weakdh.org/imperfect-forward-secrecy.pdf

Trust: 1.7

url:http://openwall.com/lists/oss-security/2015/05/20/8

Trust: 1.7

url:http://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2015-008.txt.asc

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2015-1072.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2015-1185.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2015-1197.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2015-1228.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2015-1230.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2015-1241.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2015-1242.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2015-1243.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2015-1485.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2015-1486.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2015-1488.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2015-1526.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2015-1544.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2015-1604.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2016-1624.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2016-2056.html

Trust: 1.7

url:http://www.securitytracker.com/id/1032474

Trust: 1.7

url:http://www.securitytracker.com/id/1032475

Trust: 1.7

url:http://www.securitytracker.com/id/1032476

Trust: 1.7

url:http://www.securitytracker.com/id/1032637

Trust: 1.7

url:http://www.securitytracker.com/id/1032645

Trust: 1.7

url:http://www.securitytracker.com/id/1032647

Trust: 1.7

url:http://www.securitytracker.com/id/1032648

Trust: 1.7

url:http://www.securitytracker.com/id/1032649

Trust: 1.7

url:http://www.securitytracker.com/id/1032650

Trust: 1.7

url:http://www.securitytracker.com/id/1032651

Trust: 1.7

url:http://www.securitytracker.com/id/1032652

Trust: 1.7

url:http://www.securitytracker.com/id/1032653

Trust: 1.7

url:http://www.securitytracker.com/id/1032654

Trust: 1.7

url:http://www.securitytracker.com/id/1032655

Trust: 1.7

url:http://www.securitytracker.com/id/1032656

Trust: 1.7

url:http://www.securitytracker.com/id/1032688

Trust: 1.7

url:http://www.securitytracker.com/id/1032699

Trust: 1.7

url:http://www.securitytracker.com/id/1032702

Trust: 1.7

url:http://www.securitytracker.com/id/1032727

Trust: 1.7

url:http://www.securitytracker.com/id/1032759

Trust: 1.7

url:http://www.securitytracker.com/id/1032777

Trust: 1.7

url:http://www.securitytracker.com/id/1032778

Trust: 1.7

url:http://www.securitytracker.com/id/1032783

Trust: 1.7

url:http://www.securitytracker.com/id/1032784

Trust: 1.7

url:http://www.securitytracker.com/id/1032856

Trust: 1.7

url:http://www.securitytracker.com/id/1032864

Trust: 1.7

url:http://www.securitytracker.com/id/1032865

Trust: 1.7

url:http://www.securitytracker.com/id/1032871

Trust: 1.7

url:http://www.securitytracker.com/id/1032884

Trust: 1.7

url:http://www.securitytracker.com/id/1032910

Trust: 1.7

url:http://www.securitytracker.com/id/1032932

Trust: 1.7

url:http://www.securitytracker.com/id/1032960

Trust: 1.7

url:http://www.securitytracker.com/id/1033019

Trust: 1.7

url:http://www.securitytracker.com/id/1033064

Trust: 1.7

url:http://www.securitytracker.com/id/1033065

Trust: 1.7

url:http://www.securitytracker.com/id/1033067

Trust: 1.7

url:http://www.securitytracker.com/id/1033208

Trust: 1.7

url:http://www.securitytracker.com/id/1033209

Trust: 1.7

url:http://www.securitytracker.com/id/1033210

Trust: 1.7

url:http://www.securitytracker.com/id/1033222

Trust: 1.7

url:http://www.securitytracker.com/id/1033341

Trust: 1.7

url:http://www.securitytracker.com/id/1033385

Trust: 1.7

url:http://www.securitytracker.com/id/1033416

Trust: 1.7

url:http://www.securitytracker.com/id/1033430

Trust: 1.7

url:http://www.securitytracker.com/id/1033433

Trust: 1.7

url:http://www.securitytracker.com/id/1033513

Trust: 1.7

url:http://www.securitytracker.com/id/1033760

Trust: 1.7

url:http://www.securitytracker.com/id/1033891

Trust: 1.7

url:http://www.securitytracker.com/id/1033991

Trust: 1.7

url:http://www.securitytracker.com/id/1034087

Trust: 1.7

url:http://www.securitytracker.com/id/1034728

Trust: 1.7

url:http://www.securitytracker.com/id/1034884

Trust: 1.7

url:http://www.securitytracker.com/id/1036218

Trust: 1.7

url:http://www.securitytracker.com/id/1040630

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-updates/2015-07/msg00016.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-updates/2016-02/msg00094.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-updates/2016-02/msg00097.html

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-2656-1

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-2656-2

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-2673-1

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-2696-1

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-2706-1

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=144102017024820&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143637549705650&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144060576831314&w=2

Trust: 1.6

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10681

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143506486712441&w=2

Trust: 1.6

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbhf03831en_us

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144043644216842&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144050121701297&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=145409266329539&w=2

Trust: 1.6

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10122

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143880121627664&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144104533800819&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144060606031437&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144061542602287&w=2

Trust: 1.6

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10727

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144493176821532&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143628304012255&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143655800220052&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143557934009303&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144069189622016&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143558092609708&w=2

Trust: 1.6

url:https://weakdh.org/

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4000

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2022.0696

Trust: 0.6

url:https://www.ibm.com/support/docview.wss?uid=ibm11073000

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1333

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-spectrum-protect-backup-archive-client-web-user-interface-ibm-spectrum-protect-for-space-management-and-ibm-spectrum-protect-for-virtual-environments-are-vulnerabile-to-logjam/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-spectrum-protect-plus-vulnerable-to-logjam-cve-2015-4000/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.3475/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2015-2808

Trust: 0.4

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.4

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.4

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-4732

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-4748

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2628

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2632

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-4733

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-4749

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2625

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-4760

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2601

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2621

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-4731

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2590

Trust: 0.2

url:https://www.hp.com/go/swa

Trust: 0.2

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n

Trust: 0.2

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.2

url:https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea

Trust: 0.2

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.2

url:http://kb.juniper.net/infocenter/index?page=content&amp;id=jsa10681

Trust: 0.1

url:http://kb.juniper.net/infocenter/index?page=content&amp;id=jsa10727

Trust: 0.1

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10122

Trust: 0.1

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-hpesbhf03831en_us

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=143557934009303&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=143628304012255&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=143558092609708&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=143655800220052&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=144060576831314&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=144069189622016&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=144050121701297&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=144060606031437&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=144102017024820&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=144061542602287&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=145409266329539&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=144043644216842&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=143506486712441&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=144104533800819&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=143637549705650&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=143880121627664&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=144493176821532&amp;w=2

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2613

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1790

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1789

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1793

Trust: 0.1

url:https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1791

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1788

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1792

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3183

Trust: 0.1

url:http://software.hp.com

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0118

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0231

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0226

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5704

Trust: 0.1

url:https://softwaresupport.hp.com/group/softwaresupport/search-result/-/fa

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4760

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2621

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2601

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4732

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4000

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2632

Trust: 0.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=1207101#c11

Trust: 0.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4733

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4748

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4731

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2625

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4749

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2808

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2590

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2628

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.1

url:https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facets

Trust: 0.1

sources: VULHUB: VHN-81961 // PACKETSTORM: 133234 // PACKETSTORM: 132973 // PACKETSTORM: 133990 // PACKETSTORM: 133336 // PACKETSTORM: 136247 // PACKETSTORM: 132697 // PACKETSTORM: 132413 // PACKETSTORM: 134232 // CNNVD: CNNVD-201505-428 // NVD: CVE-2015-4000

CREDITS

HP

Trust: 0.4

sources: PACKETSTORM: 133336 // PACKETSTORM: 136247 // PACKETSTORM: 132413 // PACKETSTORM: 134232

SOURCES

db:VULHUBid:VHN-81961
db:PACKETSTORMid:133234
db:PACKETSTORMid:132973
db:PACKETSTORMid:133990
db:PACKETSTORMid:133336
db:PACKETSTORMid:136247
db:PACKETSTORMid:132697
db:PACKETSTORMid:132413
db:PACKETSTORMid:134232
db:CNNVDid:CNNVD-201505-428
db:NVDid:CVE-2015-4000

LAST UPDATE DATE

2025-08-06T21:31:07.934000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-81961date:2023-02-09T00:00:00
db:CNNVDid:CNNVD-201505-428date:2023-03-03T00:00:00
db:NVDid:CVE-2015-4000date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-81961date:2015-05-21T00:00:00
db:PACKETSTORMid:133234date:2015-08-21T16:58:35
db:PACKETSTORMid:132973date:2015-08-06T10:10:00
db:PACKETSTORMid:133990date:2015-10-16T01:44:08
db:PACKETSTORMid:133336date:2015-08-26T23:39:24
db:PACKETSTORMid:136247date:2016-03-15T13:13:00
db:PACKETSTORMid:132697date:2015-07-16T17:45:29
db:PACKETSTORMid:132413date:2015-06-23T14:09:34
db:PACKETSTORMid:134232date:2015-11-05T14:17:07
db:CNNVDid:CNNVD-201505-428date:2015-05-21T00:00:00
db:NVDid:CVE-2015-4000date:2015-05-21T00:59:00.087