Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-3197

Опубликовано: 15 фев. 2016
Источник: debian
EPSS Средний

Описание

ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
opensslfixed1.0.0c-2package

Примечания

  • 1.0.0c-2 dropped SSLv2 support

  • No MITM: https://bugzilla.redhat.com/show_bug.cgi?id=1301846#c3

EPSS

Процентиль: 95%
0.18215
Средний

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 9 лет назад

ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.

redhat
больше 9 лет назад

ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.

CVSS3: 5.9
nvd
больше 9 лет назад

ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.

CVSS3: 5.9
github
около 3 лет назад

ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.

fstec
больше 9 лет назад

Уязвимость библиотеки OpenSSL, позволяющая нарушителю взломать криптографический механизм защиты

EPSS

Процентиль: 95%
0.18215
Средний