CVE-2015-0204
Published Jan 9, 2015
Last updated 6 years ago
Overview
- Description
- The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-310
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FCFDFDB8-6939-44E8-8B2D-C84D008AE169", "versionEndIncluding": "0.9.8zc" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10FF0A06-DA61-4250-B083-67E55E362677" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A6BA453-C150-4159-B80B-5465EFF83F11" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "638A2E69-8AB6-4FEA-852A-FEF16A500C1A" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56C47D3A-B99D-401D-B6B8-1194B2DB4809" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08355B10-E004-4BE6-A5AE-4D428810580B" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "738BCFDC-1C49-4774-95AE-E099F707DEF9" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4B242C0-D27D-4644-AD19-5ACB853C9DC2" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8DC683F2-4346-4E5E-A8D7-67B4F4D7827B" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "764B7D38-BC1B-47DB-B1DF-D092BDA4BFCB" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6604E7BE-9F9B-444D-A63A-F65D1CFDF3BF" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "132B9217-B0E0-4E3E-9096-162AA28E158E" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7619F9A0-9054-4217-93D1-3EA64876C5B0" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D82C405-17E2-4DF1-8DF5-315BD5A41595" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C96806F-4718-4BD3-9102-55A26AA86498" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0o:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A16CD99-AF7F-4931-AD2E-77727BA18FBD" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A66E6CF-39CF-412E-8EF0-8E10BA21B4A4" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C684FB18-FDDC-4BED-A28C-C23EE6CD0094" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A74A79A7-4FAF-4C81-8622-050008B96AE1" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CEDACCB9-8D61-49EE-9957-9E58BC7BB031" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4993DD56-F9E3-4AC8-AC3E-BF204B950DEC" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E884B241-F9C3-44F8-A420-DE65F5F3D660" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A383620-B4F7-44A7-85DA-A4FF2E115D80" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F0C6812-F455-49CF-B29B-9AC00306DA43" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F2D462C-A1B4-4572-A615-BDE9DC5F1E55" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3703E445-17C0-4C85-A496-A35641C0C8DB" } ], "operator": "OR" } ] } ]