CVE-2015-7575
Publication date 31 December 2015
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.
Status
Package | Ubuntu Release | Status |
---|---|---|
firefox | ||
18.04 LTS bionic |
Fixed 43.0.4+build3-0ubuntu1
|
|
16.04 LTS xenial |
Fixed 43.0.4+build3-0ubuntu1
|
|
14.04 LTS trusty |
Fixed 43.0.4+build3-0ubuntu0.14.04.1
|
|
gnutls26 | ||
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty |
Fixed 2.12.23-12ubuntu2.4
|
|
gnutls28 | ||
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Not in release | |
mbedtls | ||
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Not in release | |
nss | ||
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Fixed 2:3.19.2.1-0ubuntu0.14.04.2
|
|
openjdk-6 | ||
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty |
Fixed 6b38-1.13.10-0ubuntu0.14.04.1
|
|
openjdk-7 | ||
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty |
Fixed 7u95-2.6.4-0ubuntu0.14.04.1
|
|
openjdk-8 | ||
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Not in release | |
openssl | ||
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
|
openssl098 | ||
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
polarssl | ||
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
thunderbird | ||
18.04 LTS bionic |
Fixed 1:38.6.0+build1-0ubuntu1
|
|
16.04 LTS xenial |
Fixed 1:38.6.0+build1-0ubuntu1
|
|
14.04 LTS trusty |
Fixed 1:38.6.0+build1-0ubuntu0.14.04.1
|
|
Notes
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.9 · Medium |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-2866-1
- Firefox vulnerability
- 8 January 2016
- USN-2904-1
- Thunderbird vulnerabilities
- 8 March 2016
- USN-2863-1
- OpenSSL vulnerability
- 7 January 2016
- USN-2865-1
- GnuTLS vulnerability
- 8 January 2016
- USN-2884-1
- OpenJDK 7 vulnerabilities
- 1 February 2016
- USN-2864-1
- NSS vulnerability
- 7 January 2016
Other references
- https://www.mozilla.org/en-US/security/advisories/mfsa2015-150/
- http://www.mitls.org/pages/attacks/SLOTH
- http://www.gnutls.org/security.html#GNUTLS-SA-2015-2
- http://lists.gnutls.org/pipermail/gnutls-devel/2015-April/007572.html
- http://blog.fuseyism.com/index.php/2016/01/25/security-icedtea-1-13-10-for-openjdk-6-released/
- https://tls.mbed.org/tech-updates/releases/mbedtls-2.2.1-2.1.4-1.3.16-and-polarssl.1.2.19-released
- https://www.cve.org/CVERecord?id=CVE-2015-7575