Mission and Overview
NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA).
Resource Status
NVD contains:

Last updated: 10/24/2016 7:31:30 PM

CVE Publication rate: 19.63

Email List

NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists

Workload Index
Vulnerability Workload Index: 10.88
About Us
NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security's National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the Security Content Automation Protocol (SCAP).

National Cyber Awareness System

Vulnerability Summary for CVE-2015-0204

Original release date: 01/08/2015
Last revised: 09/27/2016
Source: US-CERT/NIST

Overview

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score: 4.3 MEDIUM
Impact Subscore: 2.9
Exploitability Subscore: 8.6
CVSS Version 2 Metrics:
Access Vector: Network exploitable
Access Complexity: Medium
Authentication: Not required to exploit
Impact Type: Allows unauthorized modification

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

External Source: HP
Name: HPSBMU03396
External Source: HP
Name: HPSBMU03397
External Source: CONFIRM
Name: http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
External Source: CONFIRM
Name: https://www.openssl.org/news/secadv_20150319.txt
External Source: SUSE
Name: SUSE-SU-2015:0946
External Source: DEBIAN
Name: DSA-3125
External Source: CONFIRM
Name: http://support.novell.com/security/cve/CVE-2015-0204.html
External Source: CONFIRM
Name: http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
External Source: CONFIRM
Name: http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
External Source: HP
Name: HPSBMU03409
External Source: REDHAT
Name: RHSA-2015:0066
External Source: MISC
Name: https://freakattack.com/
Type: Vendor Advisory
External Source: SUSE
Name: openSUSE-SU-2015:0130
External Source: HP
Name: HPSBOV03318
External Source: CONFIRM
Name: http://www-01.ibm.com/support/docview.wss?uid=swg21883640
External Source: REDHAT
Name: RHSA-2015:0800
External Source: REDHAT
Name: RHSA-2016:1650
External Source: HP
Name: HPSBMU03380
External Source: CONFIRM
Name: http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
External Source: MANDRIVA
Name: MDVSA-2015:019
External Source: HP
Name: HPSBMU03345
External Source: REDHAT
Name: RHSA-2015:0849
External Source: SUSE
Name: SUSE-SU-2015:0578
External Source: HP
Name: HPSBUX03162
External Source: CISCO
Name: 20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products
External Source: CONFIRM
Name: https://www.openssl.org/news/secadv_20150108.txt
Type: Vendor Advisory
External Source: HP
Name: HPSBHF03289
External Source: HP
Name: SSRT101885
External Source: MANDRIVA
Name: MDVSA-2015:062
External Source: CONFIRM
Name: http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
External Source: HP
Name: SSRT101987
External Source: MANDRIVA
Name: MDVSA-2015:063
External Source: CONFIRM
Name: https://github.com/openssl/openssl/commit/ce325c60c74b0fa784f5872404b722e120e5cab0
External Source: CONFIRM
Name: https://support.apple.com/HT204659
External Source: APPLE
Name: APPLE-SA-2015-04-08-2
External Source: HP
Name: SSRT102000
External Source: HP
Name: HPSBMU03413
External Source: BID
Name: 91787

Technical Details

Vulnerability Type (View All)

Change History 24 change records found - show changes