ID

VAR-201505-0233


CVE

CVE-2015-4000


TITLE

TLS Encryption problem vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-201505-428

DESCRIPTION

The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue. OpenSSL is prone to a security-bypass vulnerability because the application fails to properly verify SSL, TLS, and DTLS certificates. Successfully exploiting this issue allows attackers to perform man-in-the-middle attacks and bypass certain security restrictions. This may aid in further attacks. OpenSSL versions 1.0.2c, 1.0.2b, 1.0.1n, and 1.0.1o are vulnerable. OpenSSL Security Advisory [28th Jan 2016] ========================================= NOTE: SUPPORT FOR VERSION 1.0.1 WILL BE ENDING ON 31ST DECEMBER 2016. NO SECURITY FIXES WILL BE PROVIDED AFTER THAT DATE. UNTIL THAT TIME SECURITY FIXES ONLY ARE BEING APPLIED. DH small subgroups (CVE-2016-0701) ================================== Severity: High Historically OpenSSL usually only ever generated DH parameters based on "safe" primes. More recently (in version 1.0.2) support was provided for generating X9.42 style parameter files such as those required for RFC 5114 support. The primes used in such files may not be "safe". Where an application is using DH configured with parameters based on primes that are not "safe" then an attacker could use this fact to find a peer's private DH exponent. This attack requires that the attacker complete multiple handshakes in which the peer uses the same private DH exponent. For example this could be used to discover a TLS server's private DH exponent if it's reusing the private DH exponent or it's using a static DH ciphersuite. OpenSSL provides the option SSL_OP_SINGLE_DH_USE for ephemeral DH (DHE) in TLS. It is not on by default. If the option is not set then the server reuses the same private DH exponent for the life of the server process and would be vulnerable to this attack. It is believed that many popular applications do set this option and would therefore not be at risk. OpenSSL before 1.0.2f will reuse the key if: - SSL_CTX_set_tmp_dh()/SSL_set_tmp_dh() is used and SSL_OP_SINGLE_DH_USE is not set. - SSL_CTX_set_tmp_dh_callback()/SSL_set_tmp_dh_callback() is used, and both the parameters and the key are set and SSL_OP_SINGLE_DH_USE is not used. This is an undocumted feature and parameter files don't contain the key. - Static DH ciphersuites are used. The key is part of the certificate and so it will always reuse it. This is only supported in 1.0.2. It will not reuse the key for DHE ciphers suites if: - SSL_OP_SINGLE_DH_USE is set - SSL_CTX_set_tmp_dh_callback()/SSL_set_tmp_dh_callback() is used and the callback does not provide the key, only the parameters. The callback is almost always used like this. Non-safe primes are generated by OpenSSL when using: - genpkey with the dh_rfc5114 option. This will write an X9.42 style file including the prime-order subgroup size "q". This is supported since the 1.0.2 version. Older versions can't read files generated in this way. - dhparam with the -dsaparam option. This has always been documented as requiring the single use. The fix for this issue adds an additional check where a "q" parameter is available (as is the case in X9.42 based parameters). This detects the only known attack, and is the only possible defense for static DH ciphersuites. This could have some performance impact. Additionally the SSL_OP_SINGLE_DH_USE option has been switched on by default and cannot be disabled. This could have some performance impact. OpenSSL 1.0.2 users should upgrade to 1.0.2f OpenSSL 1.0.1 is not affected by this CVE because it does not support X9.42 based parameters. It is possible to generate parameters using non "safe" primes, but this option has always been documented as requiring single use and is not the default or believed to be common. However, as a precaution, the SSL_OP_SINGLE_DH_USE change has also been backported to 1.0.1r. This issue was reported to OpenSSL on 12 January 2016 by Antonio Sanso (Adobe). The fix was developed by Matt Caswell of the OpenSSL development team (incorporating some work originally written by Stephen Henson of the OpenSSL core team). SSLv2 doesn't block disabled ciphers (CVE-2015-3197) ==================================================== Severity: Low A malicious client can negotiate SSLv2 ciphers that have been disabled on the server and complete SSLv2 handshakes even if all SSLv2 ciphers have been disabled, provided that the SSLv2 protocol was not also disabled via SSL_OP_NO_SSLv2. OpenSSL 1.0.2 users should upgrade to 1.0.2f OpenSSL 1.0.1 users should upgrade to 1.0.1r This issue was reported to OpenSSL on 26th December 2015 by Nimrod Aviram and Sebastian Schinzel. The fix was developed by Nimrod Aviram with further development by Viktor Dukhovni of the OpenSSL development team. An update on DHE man-in-the-middle protection (Logjam) ==================================================================== A previously published vulnerability in the TLS protocol allows a man-in-the-middle attacker to downgrade vulnerable TLS connections using ephemeral Diffie-Hellman key exchange to 512-bit export-grade cryptography. This vulnerability is known as Logjam (CVE-2015-4000). OpenSSL added Logjam mitigation for TLS clients by rejecting handshakes with DH parameters shorter than 768 bits in releases 1.0.2b and 1.0.1n. This limit has been increased to 1024 bits in this release, to offer stronger cryptographic assurance for all TLS connections using ephemeral Diffie-Hellman key exchange. OpenSSL 1.0.2 users should upgrade to 1.0.2f OpenSSL 1.0.1 users should upgrade to 1.0.1r The fix was developed by Kurt Roeckx of the OpenSSL development team. Note ==== As per our previous announcements and our Release Strategy (https://www.openssl.org/policies/releasestrat.html), support for OpenSSL version 1.0.1 will cease on 31st December 2016. No security updates for that version will be provided after that date. Users of 1.0.1 are advised to upgrade. Support for versions 0.9.8 and 1.0.0 ended on 31st December 2015. Those versions are no longer receiving security updates. References ========== URL for this Security Advisory: https://www.openssl.org/news/secadv/20160128.txt Note: the online version of the advisory may be updated with additional details over time. For details of OpenSSL severity classifications please see: https://www.openssl.org/policies/secpolicy.html . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04772190 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04772190 Version: 2 HPSBGN03402 rev.2 - HP Performance Manager, Remote Disclosure of Information NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2015-08-26 Last Updated: 2015-08-26 Potential Security Impact: Remote disclosure of information Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified in HP Performance Manager. - The RC4 stream cipher vulnerability in SSL/TLS known as "Bar Mitzvah" could be exploited remotely to allow disclosure of information. References: CVE-2015-4000 - "Logjam" CVE-2015-2808 - "Bar Mitzvah" SSRT102204, SSRT102208 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Performance Manager v9.0x and v9.20. BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2015-2808 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2015-4000 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has made the following mitigation information and software updates available to resolve the vulnerabilities for the impacted versions of HP Performance Manager. Please consult HP Software Support Online (SSO): CVE-2015-4000 - "Logjam" https://softwaresupport.hp.com/group/softwaresupport/search-result/-/fa cetsearch/document/KM01766982 CVE-2015-2808 - "Bar Mitzvah" https://softwaresupport.hp.com/group/softwaresupport/search-result/-/fa cetsearch/document/KM01766997?lang=en&cc=us&hpappid=113963_OSP_PRO_HPE HISTORY Version:1 (rev.1) - 26 August 2015 Initial release Version:2 (rev.2) - 26 August 2015 Added missing CVSS entry for CVE-2015-4000 Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. CVE-2015-4000 David Adrian et al. reported that it may be feasible to attack Diffie-Hellman-based cipher suites in certain circumstances, compromising the confidentiality and integrity of data encrypted with Transport Layer Security (TLS). CVE-2015-7181 CVE-2015-7182 CVE-2016-1950 Tyson Smith, David Keeler, and Francis Gabriel discovered heap-based buffer overflows in the ASN.1 DER parser, potentially leading to arbitrary code execution. CVE-2015-7575 Karthikeyan Bhargavan discovered that TLS client implementation accepted MD5-based signatures for TLS 1.2 connections with forward secrecy, weakening the intended security strength of TLS connections. CVE-2016-1938 Hanno Boeck discovered that NSS miscomputed the result of integer division for certain inputs. This could weaken the cryptographic protections provided by NSS. However, NSS implements RSA-CRT leak hardening, so RSA private keys are not directly disclosed by this issue. CVE-2016-1978 Eric Rescorla discovered a user-after-free vulnerability in the implementation of ECDH-based TLS handshakes, with unknown consequences. CVE-2016-1979 Tim Taubert discovered a use-after-free vulnerability in ASN.1 DER processing, with application-specific impact. CVE-2016-2834 Tyson Smith and Jed Davis discovered unspecified memory-safety bugs in NSS. In addition, the NSS library did not ignore environment variables in processes which underwent a SUID/SGID/AT_SECURE transition at process start. In certain system configurations, this allowed local users to escalate their privileges. For the stable distribution (jessie), these problems have been fixed in version 2:3.26-1+debu8u1. For the unstable distribution (sid), these problems have been fixed in version 2:3.23-1. We recommend that you upgrade your nss packages. HP Operations Agent Virtual Appliance v11.11, v11.12, v11.13, v11.14. HP Service Health Reporter v9.20, v9.30, v9.31, v9.32, and v9.40. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201603-11 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Oracle JRE/JDK: Multiple vulnerabilities Date: March 12, 2016 Bugs: #525472, #540054, #546678, #554886, #563684, #572432 ID: 201603-11 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Oracle's JRE and JDK software suites allowing remote attackers to remotely execute arbitrary code, obtain information, and cause Denial of Service. Background ========== Java Platform, Standard Edition (Java SE) lets you develop and deploy Java applications on desktops and servers, as well as in today's demanding embedded environments. Java offers the rich user interface, performance, versatility, portability, and security that today's applications require. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-java/oracle-jre-bin < 1.8.0.72 >= 1.8.0.72 2 dev-java/oracle-jdk-bin < 1.8.0.72 >= 1.8.0.72 ------------------------------------------------------------------- 2 affected packages Description =========== Multiple vulnerabilities exist in both Oracle's JRE and JDK. Please review the referenced CVE's for additional information. Impact ====== Remote attackers could gain access to information, remotely execute arbitrary code, and cause Denial of Service. Workaround ========== There is no known workaround at this time. Resolution ========== All Oracle JRE Users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=dev-java/oracle-jre-bin-1.8.0.72" All Oracle JDK Users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=dev-java/oracle-jdk-bin-1.8.0.72" References ========== [ 1 ] CVE-2015-0437 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0437 [ 2 ] CVE-2015-0437 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0437 [ 3 ] CVE-2015-0458 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0458 [ 4 ] CVE-2015-0459 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0459 [ 5 ] CVE-2015-0460 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0460 [ 6 ] CVE-2015-0469 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0469 [ 7 ] CVE-2015-0470 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0470 [ 8 ] CVE-2015-0477 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0477 [ 9 ] CVE-2015-0478 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0478 [ 10 ] CVE-2015-0480 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0480 [ 11 ] CVE-2015-0484 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0484 [ 12 ] CVE-2015-0486 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0486 [ 13 ] CVE-2015-0488 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0488 [ 14 ] CVE-2015-0491 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0491 [ 15 ] CVE-2015-0492 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0492 [ 16 ] CVE-2015-2590 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2590 [ 17 ] CVE-2015-2601 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2601 [ 18 ] CVE-2015-2613 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2613 [ 19 ] CVE-2015-2619 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2619 [ 20 ] CVE-2015-2621 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2621 [ 21 ] CVE-2015-2625 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2625 [ 22 ] CVE-2015-2627 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2627 [ 23 ] CVE-2015-2628 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2628 [ 24 ] CVE-2015-2632 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2632 [ 25 ] CVE-2015-2637 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2637 [ 26 ] CVE-2015-2638 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2638 [ 27 ] CVE-2015-2659 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2659 [ 28 ] CVE-2015-2664 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2664 [ 29 ] CVE-2015-4000 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000 [ 30 ] CVE-2015-4729 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4729 [ 31 ] CVE-2015-4731 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4731 [ 32 ] CVE-2015-4732 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4732 [ 33 ] CVE-2015-4733 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4733 [ 34 ] CVE-2015-4734 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4734 [ 35 ] CVE-2015-4734 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4734 [ 36 ] CVE-2015-4736 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4736 [ 37 ] CVE-2015-4748 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4748 [ 38 ] CVE-2015-4760 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4760 [ 39 ] CVE-2015-4803 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4803 [ 40 ] CVE-2015-4803 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4803 [ 41 ] CVE-2015-4805 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4805 [ 42 ] CVE-2015-4805 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4805 [ 43 ] CVE-2015-4806 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4806 [ 44 ] CVE-2015-4806 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4806 [ 45 ] CVE-2015-4810 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4810 [ 46 ] CVE-2015-4810 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4810 [ 47 ] CVE-2015-4835 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4835 [ 48 ] CVE-2015-4835 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4835 [ 49 ] CVE-2015-4840 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4840 [ 50 ] CVE-2015-4840 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4840 [ 51 ] CVE-2015-4842 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4842 [ 52 ] CVE-2015-4842 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4842 [ 53 ] CVE-2015-4843 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4843 [ 54 ] CVE-2015-4843 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4843 [ 55 ] CVE-2015-4844 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4844 [ 56 ] CVE-2015-4844 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4844 [ 57 ] CVE-2015-4860 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4860 [ 58 ] CVE-2015-4860 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4860 [ 59 ] CVE-2015-4868 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4868 [ 60 ] CVE-2015-4868 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4868 [ 61 ] CVE-2015-4871 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4871 [ 62 ] CVE-2015-4871 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4871 [ 63 ] CVE-2015-4872 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4872 [ 64 ] CVE-2015-4872 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4872 [ 65 ] CVE-2015-4881 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4881 [ 66 ] CVE-2015-4881 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4881 [ 67 ] CVE-2015-4882 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4882 [ 68 ] CVE-2015-4882 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4882 [ 69 ] CVE-2015-4883 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4883 [ 70 ] CVE-2015-4883 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4883 [ 71 ] CVE-2015-4893 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4893 [ 72 ] CVE-2015-4893 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4893 [ 73 ] CVE-2015-4901 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4901 [ 74 ] CVE-2015-4901 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4901 [ 75 ] CVE-2015-4902 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4902 [ 76 ] CVE-2015-4902 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4902 [ 77 ] CVE-2015-4903 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4903 [ 78 ] CVE-2015-4903 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4903 [ 79 ] CVE-2015-4906 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4906 [ 80 ] CVE-2015-4906 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4906 [ 81 ] CVE-2015-4908 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4908 [ 82 ] CVE-2015-4908 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4908 [ 83 ] CVE-2015-4911 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4911 [ 84 ] CVE-2015-4911 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4911 [ 85 ] CVE-2015-4916 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4916 [ 86 ] CVE-2015-4916 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4916 [ 87 ] CVE-2015-7840 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7840 [ 88 ] CVE-2015-7840 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7840 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201603-11 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: java-1.7.1-ibm security update Advisory ID: RHSA-2015:1485-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1485.html Issue date: 2015-07-22 CVE Names: CVE-2015-1931 CVE-2015-2590 CVE-2015-2601 CVE-2015-2613 CVE-2015-2619 CVE-2015-2621 CVE-2015-2625 CVE-2015-2632 CVE-2015-2637 CVE-2015-2638 CVE-2015-2664 CVE-2015-4000 CVE-2015-4729 CVE-2015-4731 CVE-2015-4732 CVE-2015-4733 CVE-2015-4736 CVE-2015-4748 CVE-2015-4749 CVE-2015-4760 ===================================================================== 1. Summary: Updated java-1.7.1-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 6 and 7 Supplementary. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Supplementary (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Supplementary (v. 7) - x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 7) - x86_64 3. Description: IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security alerts page, listed in the References section. (CVE-2015-1931, CVE-2015-2590, CVE-2015-2601, CVE-2015-2613, CVE-2015-2619, CVE-2015-2621, CVE-2015-2625, CVE-2015-2632, CVE-2015-2637, CVE-2015-2638, CVE-2015-2664, CVE-2015-4000, CVE-2015-4729, CVE-2015-4731, CVE-2015-4732, CVE-2015-4733, CVE-2015-4736, CVE-2015-4748, CVE-2015-4749, CVE-2015-4760) Note: This update forces the TLS/SSL client implementation in IBM JDK to reject DH key sizes below 768 bits to address the CVE-2015-4000 issue. Refer to Red Hat Bugzilla bug 1223211, linked to in the References section, for additional details about this change. All users of java-1.7.1-ibm are advised to upgrade to these updated packages, containing the IBM Java SE 7R1 SR3-FP10 release. All running instances of IBM Java must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks 1241965 - CVE-2015-2625 OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) 1242019 - CVE-2015-2601 OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) 1242234 - CVE-2015-4731 OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) 1242240 - CVE-2015-4732 OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) 1242275 - CVE-2015-4733 OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) 1242281 - CVE-2015-4748 OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) 1242372 - CVE-2015-2621 OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) 1242379 - CVE-2015-4749 OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) 1242394 - CVE-2015-2632 ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) 1242447 - CVE-2015-4760 ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715) 1242456 - CVE-2015-2613 NSS / JCE: missing EC parameter validation in ECDH_Derive() (OpenJDK JCE, 8075833) 1243139 - CVE-2015-2590 OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401) 1243283 - CVE-2015-2638 Oracle JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) 1243284 - CVE-2015-4736 Oracle JDK: unspecified vulnerability fixed in 7u85 and 8u51 (Deployment) 1243286 - CVE-2015-2619 Oracle JDK: unspecified vulnerability fixed in 7u85 and 8u51 (2D) 1243287 - CVE-2015-2637 Oracle JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) 1243290 - CVE-2015-4729 Oracle JDK: unspecified vulnerability fixed in 7u85 and 8u51 (Deployment) 1243300 - CVE-2015-2664 Oracle JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (Deployment) 1244828 - CVE-2015-1931 IBM JDK: plain text data stored in memory dumps 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: java-1.7.1-ibm-1.7.1.3.10-1jpp.3.el6_7.i686.rpm java-1.7.1-ibm-demo-1.7.1.3.10-1jpp.3.el6_7.i686.rpm java-1.7.1-ibm-devel-1.7.1.3.10-1jpp.3.el6_7.i686.rpm java-1.7.1-ibm-jdbc-1.7.1.3.10-1jpp.3.el6_7.i686.rpm java-1.7.1-ibm-plugin-1.7.1.3.10-1jpp.3.el6_7.i686.rpm java-1.7.1-ibm-src-1.7.1.3.10-1jpp.3.el6_7.i686.rpm x86_64: java-1.7.1-ibm-1.7.1.3.10-1jpp.3.el6_7.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.3.10-1jpp.3.el6_7.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.3.10-1jpp.3.el6_7.x86_64.rpm java-1.7.1-ibm-jdbc-1.7.1.3.10-1jpp.3.el6_7.x86_64.rpm java-1.7.1-ibm-plugin-1.7.1.3.10-1jpp.3.el6_7.x86_64.rpm java-1.7.1-ibm-src-1.7.1.3.10-1jpp.3.el6_7.x86_64.rpm Red Hat Enterprise Linux HPC Node Supplementary (v. 6): x86_64: java-1.7.1-ibm-1.7.1.3.10-1jpp.3.el6_7.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.3.10-1jpp.3.el6_7.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.3.10-1jpp.3.el6_7.x86_64.rpm java-1.7.1-ibm-src-1.7.1.3.10-1jpp.3.el6_7.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: java-1.7.1-ibm-1.7.1.3.10-1jpp.3.el6_7.i686.rpm java-1.7.1-ibm-demo-1.7.1.3.10-1jpp.3.el6_7.i686.rpm java-1.7.1-ibm-devel-1.7.1.3.10-1jpp.3.el6_7.i686.rpm java-1.7.1-ibm-jdbc-1.7.1.3.10-1jpp.3.el6_7.i686.rpm java-1.7.1-ibm-plugin-1.7.1.3.10-1jpp.3.el6_7.i686.rpm java-1.7.1-ibm-src-1.7.1.3.10-1jpp.3.el6_7.i686.rpm ppc64: java-1.7.1-ibm-1.7.1.3.10-1jpp.3.el6_7.ppc64.rpm java-1.7.1-ibm-demo-1.7.1.3.10-1jpp.3.el6_7.ppc64.rpm java-1.7.1-ibm-devel-1.7.1.3.10-1jpp.3.el6_7.ppc64.rpm java-1.7.1-ibm-jdbc-1.7.1.3.10-1jpp.3.el6_7.ppc64.rpm java-1.7.1-ibm-src-1.7.1.3.10-1jpp.3.el6_7.ppc64.rpm s390x: java-1.7.1-ibm-1.7.1.3.10-1jpp.3.el6_7.s390x.rpm java-1.7.1-ibm-demo-1.7.1.3.10-1jpp.3.el6_7.s390x.rpm java-1.7.1-ibm-devel-1.7.1.3.10-1jpp.3.el6_7.s390x.rpm java-1.7.1-ibm-jdbc-1.7.1.3.10-1jpp.3.el6_7.s390x.rpm java-1.7.1-ibm-src-1.7.1.3.10-1jpp.3.el6_7.s390x.rpm x86_64: java-1.7.1-ibm-1.7.1.3.10-1jpp.3.el6_7.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.3.10-1jpp.3.el6_7.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.3.10-1jpp.3.el6_7.x86_64.rpm java-1.7.1-ibm-jdbc-1.7.1.3.10-1jpp.3.el6_7.x86_64.rpm java-1.7.1-ibm-plugin-1.7.1.3.10-1jpp.3.el6_7.x86_64.rpm java-1.7.1-ibm-src-1.7.1.3.10-1jpp.3.el6_7.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: java-1.7.1-ibm-1.7.1.3.10-1jpp.3.el6_7.i686.rpm java-1.7.1-ibm-demo-1.7.1.3.10-1jpp.3.el6_7.i686.rpm java-1.7.1-ibm-devel-1.7.1.3.10-1jpp.3.el6_7.i686.rpm java-1.7.1-ibm-jdbc-1.7.1.3.10-1jpp.3.el6_7.i686.rpm java-1.7.1-ibm-plugin-1.7.1.3.10-1jpp.3.el6_7.i686.rpm java-1.7.1-ibm-src-1.7.1.3.10-1jpp.3.el6_7.i686.rpm x86_64: java-1.7.1-ibm-1.7.1.3.10-1jpp.3.el6_7.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.3.10-1jpp.3.el6_7.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.3.10-1jpp.3.el6_7.x86_64.rpm java-1.7.1-ibm-jdbc-1.7.1.3.10-1jpp.3.el6_7.x86_64.rpm java-1.7.1-ibm-plugin-1.7.1.3.10-1jpp.3.el6_7.x86_64.rpm java-1.7.1-ibm-src-1.7.1.3.10-1jpp.3.el6_7.x86_64.rpm Red Hat Enterprise Linux Client Supplementary (v. 7): x86_64: java-1.7.1-ibm-1.7.1.3.10-1jpp.1.el7_1.i686.rpm java-1.7.1-ibm-1.7.1.3.10-1jpp.1.el7_1.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.3.10-1jpp.1.el7_1.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.3.10-1jpp.1.el7_1.i686.rpm java-1.7.1-ibm-devel-1.7.1.3.10-1jpp.1.el7_1.x86_64.rpm java-1.7.1-ibm-jdbc-1.7.1.3.10-1jpp.1.el7_1.x86_64.rpm java-1.7.1-ibm-plugin-1.7.1.3.10-1jpp.1.el7_1.x86_64.rpm java-1.7.1-ibm-src-1.7.1.3.10-1jpp.1.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Supplementary (v. 7): x86_64: java-1.7.1-ibm-1.7.1.3.10-1jpp.1.el7_1.i686.rpm java-1.7.1-ibm-1.7.1.3.10-1jpp.1.el7_1.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.3.10-1jpp.1.el7_1.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.3.10-1jpp.1.el7_1.i686.rpm java-1.7.1-ibm-devel-1.7.1.3.10-1jpp.1.el7_1.x86_64.rpm java-1.7.1-ibm-src-1.7.1.3.10-1jpp.1.el7_1.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 7): ppc64: java-1.7.1-ibm-1.7.1.3.10-1jpp.1.el7_1.ppc.rpm java-1.7.1-ibm-1.7.1.3.10-1jpp.1.el7_1.ppc64.rpm java-1.7.1-ibm-demo-1.7.1.3.10-1jpp.1.el7_1.ppc64.rpm java-1.7.1-ibm-devel-1.7.1.3.10-1jpp.1.el7_1.ppc.rpm java-1.7.1-ibm-devel-1.7.1.3.10-1jpp.1.el7_1.ppc64.rpm java-1.7.1-ibm-jdbc-1.7.1.3.10-1jpp.1.el7_1.ppc64.rpm java-1.7.1-ibm-plugin-1.7.1.3.10-1jpp.1.el7_1.ppc.rpm java-1.7.1-ibm-src-1.7.1.3.10-1jpp.1.el7_1.ppc64.rpm s390x: java-1.7.1-ibm-1.7.1.3.10-1jpp.1.el7_1.s390.rpm java-1.7.1-ibm-1.7.1.3.10-1jpp.1.el7_1.s390x.rpm java-1.7.1-ibm-demo-1.7.1.3.10-1jpp.1.el7_1.s390x.rpm java-1.7.1-ibm-devel-1.7.1.3.10-1jpp.1.el7_1.s390.rpm java-1.7.1-ibm-devel-1.7.1.3.10-1jpp.1.el7_1.s390x.rpm java-1.7.1-ibm-jdbc-1.7.1.3.10-1jpp.1.el7_1.s390x.rpm java-1.7.1-ibm-src-1.7.1.3.10-1jpp.1.el7_1.s390x.rpm x86_64: java-1.7.1-ibm-1.7.1.3.10-1jpp.1.el7_1.i686.rpm java-1.7.1-ibm-1.7.1.3.10-1jpp.1.el7_1.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.3.10-1jpp.1.el7_1.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.3.10-1jpp.1.el7_1.i686.rpm java-1.7.1-ibm-devel-1.7.1.3.10-1jpp.1.el7_1.x86_64.rpm java-1.7.1-ibm-jdbc-1.7.1.3.10-1jpp.1.el7_1.x86_64.rpm java-1.7.1-ibm-plugin-1.7.1.3.10-1jpp.1.el7_1.x86_64.rpm java-1.7.1-ibm-src-1.7.1.3.10-1jpp.1.el7_1.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 7): ppc64le: java-1.7.1-ibm-1.7.1.3.10-1jpp.1.ael7b_1.ppc64le.rpm java-1.7.1-ibm-demo-1.7.1.3.10-1jpp.1.ael7b_1.ppc64le.rpm java-1.7.1-ibm-devel-1.7.1.3.10-1jpp.1.ael7b_1.ppc64le.rpm java-1.7.1-ibm-jdbc-1.7.1.3.10-1jpp.1.ael7b_1.ppc64le.rpm java-1.7.1-ibm-src-1.7.1.3.10-1jpp.1.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 7): x86_64: java-1.7.1-ibm-1.7.1.3.10-1jpp.1.el7_1.i686.rpm java-1.7.1-ibm-1.7.1.3.10-1jpp.1.el7_1.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.3.10-1jpp.1.el7_1.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.3.10-1jpp.1.el7_1.i686.rpm java-1.7.1-ibm-devel-1.7.1.3.10-1jpp.1.el7_1.x86_64.rpm java-1.7.1-ibm-jdbc-1.7.1.3.10-1jpp.1.el7_1.x86_64.rpm java-1.7.1-ibm-plugin-1.7.1.3.10-1jpp.1.el7_1.x86_64.rpm java-1.7.1-ibm-src-1.7.1.3.10-1jpp.1.el7_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-1931 https://access.redhat.com/security/cve/CVE-2015-2590 https://access.redhat.com/security/cve/CVE-2015-2601 https://access.redhat.com/security/cve/CVE-2015-2613 https://access.redhat.com/security/cve/CVE-2015-2619 https://access.redhat.com/security/cve/CVE-2015-2621 https://access.redhat.com/security/cve/CVE-2015-2625 https://access.redhat.com/security/cve/CVE-2015-2632 https://access.redhat.com/security/cve/CVE-2015-2637 https://access.redhat.com/security/cve/CVE-2015-2638 https://access.redhat.com/security/cve/CVE-2015-2664 https://access.redhat.com/security/cve/CVE-2015-4000 https://access.redhat.com/security/cve/CVE-2015-4729 https://access.redhat.com/security/cve/CVE-2015-4731 https://access.redhat.com/security/cve/CVE-2015-4732 https://access.redhat.com/security/cve/CVE-2015-4733 https://access.redhat.com/security/cve/CVE-2015-4736 https://access.redhat.com/security/cve/CVE-2015-4748 https://access.redhat.com/security/cve/CVE-2015-4749 https://access.redhat.com/security/cve/CVE-2015-4760 https://access.redhat.com/security/updates/classification/#critical http://www.ibm.com/developerworks/java/jdk/alerts/ https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVr/eKXlSAg2UNWIIRAr6SAJ43EiWVdsKQvTubbW5f4Au23Va4rgCgvzrn DicKzUsMq2SwgjIgR26ZYx4= =8KhT -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . This may allow remote disclosure of information. Do the following to mitigate the logjam issue in HP-UX Firefox and Thunderbird: HP-UX Firefox browser: Visit about:config in the Firefox browser Search for ssl3 and disable DHE_EXPORT ciphers by setting below preferences values to false. security.ssl3.dhe_rsa_aes_128_sha security.ssl3.dhe_rsa_aes_256_sha Restart the browser HP-UX Thunderbird: Select "Preferences" from the "Edit" menu Select "Advanced" Tab and then click on "Config Editor" button Search for security.ssl3.dhe_rsa_aes and disable DHE_EXPORT ciphers by setting below preference values to false

Trust: 1.98

sources: NVD: CVE-2015-4000 // BID: 75652 // PACKETSTORM: 169661 // PACKETSTORM: 133344 // PACKETSTORM: 139002 // PACKETSTORM: 135510 // PACKETSTORM: 133338 // PACKETSTORM: 133324 // PACKETSTORM: 136182 // PACKETSTORM: 132804 // PACKETSTORM: 134755

AFFECTED PRODUCTS

vendor:mozillamodel:firefox osscope:eqversion:2.2

Trust: 1.6

vendor:mozillamodel:firefox esrscope:eqversion:31.8

Trust: 1.6

vendor:mozillamodel:thunderbirdscope:eqversion:31.8

Trust: 1.6

vendor:mozillamodel:thunderbirdscope:eqversion:38.1

Trust: 1.6

vendor:mozillamodel:seamonkeyscope:eqversion:2.35

Trust: 1.6

vendor:mozillamodel:firefoxscope:eqversion:39.0

Trust: 1.6

vendor:susemodel:linux enterprise serverscope:eqversion:12

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.10

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.19

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.7.0

Trust: 1.0

vendor:opensslmodel:opensslscope:lteversion:1.0.2a

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:38.1.0

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:12

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.6.0

Trust: 1.0

vendor:ibmmodel:content managerscope:eqversion:8.5

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.8.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:microsoftmodel:internet explorerscope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:15.04

Trust: 1.0

vendor:operamodel:browserscope:eqversion: -

Trust: 1.0

vendor:applemodel:iphone osscope:lteversion:8.3

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.0.2

Trust: 1.0

vendor:oraclemodel:jrockitscope:eqversion:r28.3.6

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.7.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.6.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:opensslmodel:opensslscope:lteversion:1.0.1m

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.0.1

Trust: 1.0

vendor:applemodel:mac os xscope:lteversion:10.10.3

Trust: 1.0

vendor:susemodel:linux enterprise software development kitscope:eqversion:12

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion: -

Trust: 1.0

vendor:googlemodel:chromescope:eqversion: -

Trust: 1.0

vendor:hpmodel:hp-uxscope:eqversion:b.11.31

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.8.0

Trust: 1.0

vendor:oraclemodel:sparc-opl service processorscope:lteversion:1121

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:11.0

Trust: 1.0

vendor:junipermodel:junos 12.1x44-d20scope: - version: -

Trust: 0.9

vendor:junipermodel:junos 12.1x46-d25scope: - version: -

Trust: 0.6

vendor:mozillamodel:firefox esrscope:eqversion:38.1.0

Trust: 0.6

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.2.0.3

Trust: 0.3

vendor:ibmmodel:security network controller 1.0.3361mscope: - version: -

Trust: 0.3

vendor:ciscomodel:registered envelope servicescope:eqversion:0

Trust: 0.3

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.53

Trust: 0.3

vendor:hpmodel:hp-ux b.11.22scope: - version: -

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d33scope: - version: -

Trust: 0.3

vendor:ibmmodel:i v5r4scope:eqversion:6.1

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:8.2

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d25scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.1r3scope: - version: -

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:9.1.1

Trust: 0.3

vendor:oraclemodel:enterprise manager base platformscope:eqversion:12.1.0.4

Trust: 0.3

vendor:ibmmodel:worklight foundation consumer editionscope:eqversion:6.20

Trust: 0.3

vendor:junipermodel:junos 13.3r5scope: - version: -

Trust: 0.3

vendor:ibmmodel:rational tauscope:eqversion:4.35

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.1209

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.1.0.4

Trust: 0.3

vendor:ibmmodel:i v5r3scope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:netinsightscope:eqversion:8.6.0

Trust: 0.3

vendor:oraclemodel:agile engineering data managementscope:eqversion:6.1.2.2

Trust: 0.3

vendor:ciscomodel:ios xescope:neversion:3.14

Trust: 0.3

vendor:ibmmodel:rational automation framework ifix5scope:neversion:3.0.1.3

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d35scope: - version: -

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.3361

Trust: 0.3

vendor:ibmmodel:rational automation frameworkscope:eqversion:3.0.1.1

Trust: 0.3

vendor:oraclemodel:jd edwards enterpriseone toolsscope:eqversion:9.2

Trust: 0.3

vendor:hpmodel:hp-ux b.11.04scope: - version: -

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.13-34

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d51scope: - version: -

Trust: 0.3

vendor:ciscomodel:prime license managerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:worklight foundation enterprise editionscope:eqversion:6.20

Trust: 0.3

vendor:ciscomodel:agent for openflowscope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d34scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r6scope: - version: -

Trust: 0.3

vendor:ibmmodel:rational automation frameworkscope:eqversion:3.0.1.3

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.1

Trust: 0.3

vendor:hpmodel:imc productsscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:digital media players series 5.4 rbscope:neversion:4400

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d10scope: - version: -

Trust: 0.3

vendor:ciscomodel:digital media players seriesscope:eqversion:44000

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.16-37

Trust: 0.3

vendor:ciscomodel:digital media players 5.3 rbscope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d50scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r4scope: - version: -

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.11

Trust: 0.3

vendor:ibmmodel:rational application developer for webspherescope:eqversion:9.1.1

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:11.1

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d15scope: - version: -

Trust: 0.3

vendor:ibmmodel:rational application developer for webspherescope:eqversion:9.1

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.4-23

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:neversion:10.0

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.25-57

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.18-43

Trust: 0.3

vendor:ciscomodel:telepresence conductor xc4.0scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios xescope:neversion:3.16

Trust: 0.3

vendor:ibmmodel:security appscan enterprisescope:eqversion:9.0.1

Trust: 0.3

vendor:oraclemodel:ethernet switch es2-64scope:neversion:2.0.0.6

Trust: 0.3

vendor:ciscomodel:ios xescope:neversion:3.15

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:11.1.3

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.913

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d20scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.3r2scope: - version: -

Trust: 0.3

vendor:ibmmodel:aspera enterprise serverscope:eqversion:3.5.5

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.20

Trust: 0.3

vendor:junipermodel:junos d30scope:eqversion:12.1x44

Trust: 0.3

vendor:ciscomodel:local collector appliancescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:mobilefirst platform foundationscope:eqversion:6.3.0.0

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:neversion:12.2

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.11-28

Trust: 0.3

vendor:ibmmodel:security appscan enterprisescope:eqversion:9.0.2

Trust: 0.3

vendor:oraclemodel:ethernet switch es2-72scope:neversion:2.0.0.6

Trust: 0.3

vendor:junipermodel:junos 15.1r2scope:neversion: -

Trust: 0.3

vendor:ibmmodel:rational tauscope:eqversion:4.36

Trust: 0.3

vendor:ibmmodel:security network controller 1.0.3350mscope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.2r1scope: - version: -

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.3

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:neversion:10.5.1

Trust: 0.3

vendor:junipermodel:junos 14.1r2scope: - version: -

Trust: 0.3

vendor:oraclemodel:ethernet switch es2-64scope:eqversion:1.9.1

Trust: 0.3

vendor:oraclemodel:enterprise manager base platformscope:eqversion:12.1.0.5

Trust: 0.3

vendor:ibmmodel:rational tauscope:eqversion:4.34

Trust: 0.3

vendor:ciscomodel:digital media players 5.4 rbscope:neversion: -

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.5

Trust: 0.3

vendor:ibmmodel:rational automation frameworkscope:eqversion:3.0.1

Trust: 0.3

vendor:oraclemodel:jd edwards world security a9.4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r4scope: - version: -

Trust: 0.3

vendor:oraclemodel:sun blade ethernet switched nem 24p 10gescope:eqversion:60000

Trust: 0.3

vendor:ciscomodel:packet tracerscope:eqversion:5.2

Trust: 0.3

vendor:ciscomodel:registered envelope servicescope:neversion:4.4.1

Trust: 0.3

vendor:ibmmodel:aspera orchestratorscope:eqversion:2.3

Trust: 0.3

vendor:junipermodel:junos 12.3r6scope: - version: -

Trust: 0.3

vendor:oraclemodel:ethernet switch es2-72scope:eqversion:1.9.1

Trust: 0.3

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.54

Trust: 0.3

vendor:ciscomodel:partner supporting servicescope:eqversion:0

Trust: 0.3

vendor:oraclemodel:oss support toolsscope:eqversion:8.9.15.9.8

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d20scope: - version: -

Trust: 0.3

vendor:ibmmodel:worklight consumer editionscope:eqversion:6.1.0.0

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.15-36

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d55scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos d40scope:eqversion:12.1x44

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d30.4scope: - version: -

Trust: 0.3

vendor:ciscomodel:prime collaboration deploymentscope:eqversion:0

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1pscope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1r1scope: - version: -

Trust: 0.3

vendor:ibmmodel:security network controller 1.0.3379mscope: - version: -

Trust: 0.3

vendor:ciscomodel:packet tracerscope:eqversion:5.3

Trust: 0.3

vendor:junipermodel:junos d20scope:eqversion:12.1x44

Trust: 0.3

vendor:hpmodel:comware productsscope:eqversion:50

Trust: 0.3

vendor:ciscomodel:prime network services controller 3.4.1cscope:neversion: -

Trust: 0.3

vendor:ibmmodel:rational application developer for webspherescope:eqversion:9.1.0.1

Trust: 0.3

vendor:oraclemodel:endeca serverscope:eqversion:7.6.0

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11.16.09scope: - version: -

Trust: 0.3

vendor:oraclemodel:integrated lights out managerscope:eqversion:3.2

Trust: 0.3

vendor:ciscomodel:jabber software development kitscope:eqversion:0

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:14.1

Trust: 0.3

vendor:ibmmodel:rational automation frameworkscope:eqversion:3.0.1.2

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.21

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d10scope: - version: -

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.1768

Trust: 0.3

vendor:oraclemodel:business intelligence enterprise editionscope:eqversion:11.1.1.9

Trust: 0.3

vendor:ciscomodel:webex messenger service ep1scope:neversion:7.9.9

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.1.0.15

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:9.1

Trust: 0.3

vendor:oraclemodel:switch es1-24scope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:1.0.2919

Trust: 0.3

vendor:ibmmodel:worklight enterprise editionscope:eqversion:6.1.0.0

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11.13.14scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r6scope:neversion: -

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.15

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.25

Trust: 0.3

vendor:hpmodel:comware productsscope:eqversion:70

Trust: 0.3

vendor:ibmmodel:worklight consumer editionscope:eqversion:6.1.0.2

Trust: 0.3

vendor:oraclemodel:integrated lights out managerscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:ios xescope:neversion:3.13

Trust: 0.3

vendor:freebsdmodel:10.1-stablescope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23.1.007scope: - version: -

Trust: 0.3

vendor:oraclemodel:endeca serverscope:eqversion:7.5.0

Trust: 0.3

vendor:oraclemodel:sun network 10ge switch 72pscope:eqversion:0

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11scope: - version: -

Trust: 0.3

vendor:oraclemodel:integrated lights out managerscope:eqversion:3.1

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:8.5

Trust: 0.3

vendor:ciscomodel:prime security managerscope:neversion:9.3.4.2-4

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:14.1

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.29-9

Trust: 0.3

vendor:oraclemodel:business intelligence enterprise editionscope:eqversion:11.1.1.7

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:8.6

Trust: 0.3

vendor:ciscomodel:industrial routerscope:eqversion:9100

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:9.0

Trust: 0.3

vendor:ibmmodel:security network controller 1.0.3352mscope: - version: -

Trust: 0.3

vendor:ciscomodel:security manager sp1scope:neversion:4.8

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:neversion:12.1.4

Trust: 0.3

vendor:ibmmodel:rational tau interim fixscope:eqversion:4.3.0.6

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:50000

Trust: 0.3

vendor:ibmmodel:infosphere information serverscope:eqversion:11.3

Trust: 0.3

vendor:ciscomodel:local collector appliancescope:neversion:2.2.10

Trust: 0.3

vendor:ibmmodel:i v5r4scope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.0

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1nscope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1oscope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d26scope: - version: -

Trust: 0.3

vendor:slackwaremodel:linux x86 64 -currentscope: - version: -

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:14.0

Trust: 0.3

vendor:junipermodel:junos 14.2r2scope: - version: -

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:neversion:12.3

Trust: 0.3

vendor:ibmmodel:i v5r3scope:eqversion:7.1

Trust: 0.3

vendor:ciscomodel:digital media playersscope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos d10scope:eqversion:12.1x44

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d35scope: - version: -

Trust: 0.3

vendor:ibmmodel:i v5r4scope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.2

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11.02.008scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d25scope: - version: -

Trust: 0.3

vendor:ibmmodel:netezza host managementscope:eqversion:5.3.2.0

Trust: 0.3

vendor:ciscomodel:prime network services controllerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:i v5r3scope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:aspera point to pointscope:eqversion:3.5.5

Trust: 0.3

vendor:ciscomodel:webex messenger servicescope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d55scope:neversion: -

Trust: 0.3

vendor:ibmmodel:netinsightscope:neversion:8.6.0.14

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d11scope: - version: -

Trust: 0.3

vendor:junipermodel:junos d25scope:eqversion:12.1x46

Trust: 0.3

vendor:junipermodel:junos 12.3r3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r7scope: - version: -

Trust: 0.3

vendor:ciscomodel:security managerscope:eqversion:0

Trust: 0.3

vendor:huaweimodel:esight network v300r003c10spc201scope:neversion: -

Trust: 0.3

vendor:oraclemodel:agile engineering data managementscope:eqversion:6.1.3.0

Trust: 0.3

vendor:ciscomodel:socialminerscope:neversion:11.5.1

Trust: 0.3

vendor:junipermodel:junos 14.2r4scope:neversion: -

Trust: 0.3

vendor:oraclemodel:endeca serverscope:eqversion:7.3.0

Trust: 0.3

vendor:ibmmodel:aspera faspex applicationscope:eqversion:3.9.2

Trust: 0.3

vendor:ciscomodel:asa cx and cisco prime security managerscope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d40scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos d25scope:eqversion:12.1x44

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d20scope: - version: -

Trust: 0.3

vendor:ciscomodel:socialminerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:8.1

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:neversion:10.6

Trust: 0.3

vendor:ibmmodel:security appscan enterprisescope:eqversion:9.0

Trust: 0.3

vendor:ciscomodel:model d9485 davic qpskscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.24

Trust: 0.3

vendor:junipermodel:junos d35scope:eqversion:12.1x44

Trust: 0.3

vendor:hpmodel:vcx productsscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:agile engineering data managementscope:eqversion:6.2.0.0

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d45scope:neversion: -

Trust: 0.3

vendor:ciscomodel:nexus series fexscope:eqversion:20000

Trust: 0.3

vendor:oraclemodel:tuxedoscope:eqversion:12.1.1.0

Trust: 0.3

vendor:ibmmodel:security network controller 1.0.3381mscope: - version: -

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:neversion:9.5

Trust: 0.3

vendor:ibmmodel:netezza host managementscope:eqversion:5.3.3

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d40scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d30scope: - version: -

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:neversion:12.2.1

Trust: 0.3

vendor:ibmmodel:rational tau interim fixscope:neversion:4.3.0.6

Trust: 0.3

vendor:ciscomodel:digital media players series 5.4 rbscope:neversion:4300

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d30scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11.17.02scope: - version: -

Trust: 0.3

vendor:ciscomodel:prime security managerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.18-49

Trust: 0.3

vendor:ibmmodel:infosphere information serverscope:eqversion:9.1

Trust: 0.3

vendor:hpmodel:hp-ux b.11.00scope: - version: -

Trust: 0.3

vendor:ciscomodel:virtual security gatewayscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:puredata system for analyticsscope:eqversion:1.0

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.3

vendor:ciscomodel:industrial router 1.2.1rb3scope:neversion:910

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.13-41

Trust: 0.3

vendor:ibmmodel:aspera consolescope:eqversion:3.0.1

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:14.0

Trust: 0.3

vendor:ibmmodel:rational tauscope:eqversion:4.31

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23.07.04scope: - version: -

Trust: 0.3

vendor:ibmmodel:netezza host managementscope:neversion:5.3.7.0

Trust: 0.3

vendor:ciscomodel:unified attendant console standardscope:eqversion:0

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2dscope:neversion: -

Trust: 0.3

vendor:ibmmodel:contactoptimizationscope:eqversion:8.3

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d10scope: - version: -

Trust: 0.3

vendor:oraclemodel:jd edwards enterpriseone toolsscope:eqversion:9.1

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.3381

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.9-34

Trust: 0.3

vendor:ciscomodel:digital media players seriesscope:eqversion:43000

Trust: 0.3

vendor:ibmmodel:security proventia network active bypass 0343c3cscope: - version: -

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.23

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d40scope:neversion: -

Trust: 0.3

vendor:ibmmodel:infosphere information serverscope:eqversion:8.5

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:12.1

Trust: 0.3

vendor:junipermodel:junos 12.3r11scope:neversion: -

Trust: 0.3

vendor:ibmmodel:aspera proxyscope:eqversion:1.2.2

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:worklight consumer editionscope:eqversion:6.1.0.1

Trust: 0.3

vendor:junipermodel:junos 13.3r7scope:neversion: -

Trust: 0.3

vendor:huaweimodel:esight network v300r003c10spc100scope: - version: -

Trust: 0.3

vendor:junipermodel:junosscope:eqversion:12.1x47

Trust: 0.3

vendor:ibmmodel:aspera sharesscope:eqversion:1.9.2

Trust: 0.3

vendor:oraclemodel:solarisscope:eqversion:11.2

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d10scope: - version: -

Trust: 0.3

vendor:oraclemodel:switch es1-24scope:eqversion:1.3

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.3376

Trust: 0.3

vendor:oraclemodel:endeca serverscope:eqversion:7.4

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.18-42

Trust: 0.3

vendor:ibmmodel:worklight enterprise editionscope:eqversion:6.1.0.2

Trust: 0.3

vendor:junipermodel:junos 14.1r5scope: - version: -

Trust: 0.3

vendor:ibmmodel:sdk for node.jsscope:eqversion:1.2.0.4

Trust: 0.3

vendor:ibmmodel:aspera enterprise server clientscope:eqversion:3.5.5

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.1.1

Trust: 0.3

vendor:ibmmodel:worklight foundation consumer editionscope:eqversion:6.2.0.1

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.16

Trust: 0.3

vendor:ibmmodel:aspera ondemandscope:eqversion:3.5.4

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r9scope: - version: -

Trust: 0.3

vendor:ciscomodel:telepresence conductorscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.1

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:1.0.1876

Trust: 0.3

vendor:ciscomodel:digital media players series 5.3 rbscope:neversion:4300

Trust: 0.3

vendor:ibmmodel:worklight enterprise editionscope:eqversion:6.1.0.1

Trust: 0.3

vendor:ciscomodel:connected analytics for collaborationscope:eqversion:0

Trust: 0.3

vendor:hpmodel:cloud service automationscope:eqversion:4.5

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d26scope: - version: -

Trust: 0.3

vendor:ibmmodel:worklight foundation enterprise editionscope:eqversion:6.2.0.1

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11.14.15scope: - version: -

Trust: 0.3

vendor:ciscomodel:webex node for mcsscope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d35.5scope: - version: -

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d30scope:neversion: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2cscope: - version: -

Trust: 0.3

vendor:ibmmodel:rational tauscope:eqversion:4.32

Trust: 0.3

vendor:ciscomodel:virtual security gateway for microsoft hyper-vscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:sun blade ethernet switched nem 24p 10gescope:neversion:60001.2.2.13

Trust: 0.3

vendor:ciscomodel:services analytic platformscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:switch es1-24scope:neversion:1.3.1.3

Trust: 0.3

vendor:ciscomodel:security managerscope:neversion:4.9

Trust: 0.3

vendor:ibmmodel:security network controller 1.0.3376mscope: - version: -

Trust: 0.3

vendor:ibmmodel:infosphere information serverscope:eqversion:8.1

Trust: 0.3

vendor:ibmmodel:rational tauscope:eqversion:4.3

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.3379

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d15scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2bscope: - version: -

Trust: 0.3

vendor:oraclemodel:mysql serverscope:eqversion:5.6.22

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d36scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d25scope: - version: -

Trust: 0.3

vendor:ciscomodel:network performance analyticsscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:mobilefirst platform foundationscope:eqversion:7.0.0.0

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11.15.13scope: - version: -

Trust: 0.3

vendor:ciscomodel:emergency responderscope: - version: -

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:8.6

Trust: 0.3

vendor:ibmmodel:campaignscope:eqversion:9.0

Trust: 0.3

vendor:ibmmodel:infosphere information serverscope:eqversion:8.7

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d20scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.2r3scope: - version: -

Trust: 0.3

vendor:ciscomodel:model d9485 davic qpskscope:neversion:1.2.19

Trust: 0.3

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:12.1.0.1

Trust: 0.3

vendor:ibmmodel:rational tauscope:eqversion:4.33

Trust: 0.3

vendor:ibmmodel:netezza host managementscope:eqversion:5.3.6.0

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d15scope: - version: -

Trust: 0.3

vendor:oraclemodel:sun network 10ge switch 72pscope:neversion:1.2.2.15

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d15scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d32scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d30scope: - version: -

Trust: 0.3

vendor:ciscomodel:im and presence servicescope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos 12.3r10scope: - version: -

Trust: 0.3

vendor:ciscomodel:digital media players series 5.3 rbscope:neversion:4400

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d15scope: - version: -

Trust: 0.3

sources: BID: 75652 // CNNVD: CNNVD-201505-428 // NVD: CVE-2015-4000

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-4000
value: LOW

Trust: 1.0

CNNVD: CNNVD-201505-428
value: LOW

Trust: 0.6

nvd@nist.gov: CVE-2015-4000
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

nvd@nist.gov: CVE-2015-4000
baseSeverity: LOW
baseScore: 3.7
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 1.4
version: 3.0

Trust: 1.0

sources: CNNVD: CNNVD-201505-428 // NVD: CVE-2015-4000

PROBLEMTYPE DATA

problemtype:CWE-310

Trust: 1.0

sources: NVD: CVE-2015-4000

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 136182 // PACKETSTORM: 134755 // CNNVD: CNNVD-201505-428

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201505-428

PATCH

title:TLS Fixing measures for protocol encryption problem vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=89458

Trust: 0.6

sources: CNNVD: CNNVD-201505-428

EXTERNAL IDS

db:NVDid:CVE-2015-4000

Trust: 2.8

db:SECTRACKid:1033891

Trust: 1.6

db:SECTRACKid:1032932

Trust: 1.6

db:SECTRACKid:1036218

Trust: 1.6

db:SECTRACKid:1033341

Trust: 1.6

db:SECTRACKid:1033513

Trust: 1.6

db:SECTRACKid:1032654

Trust: 1.6

db:SECTRACKid:1032650

Trust: 1.6

db:SECTRACKid:1032649

Trust: 1.6

db:SECTRACKid:1032871

Trust: 1.6

db:SECTRACKid:1032653

Trust: 1.6

db:SECTRACKid:1034728

Trust: 1.6

db:SECTRACKid:1034884

Trust: 1.6

db:SECTRACKid:1033222

Trust: 1.6

db:SECTRACKid:1032699

Trust: 1.6

db:SECTRACKid:1032759

Trust: 1.6

db:SECTRACKid:1033064

Trust: 1.6

db:SECTRACKid:1032476

Trust: 1.6

db:SECTRACKid:1032688

Trust: 1.6

db:SECTRACKid:1040630

Trust: 1.6

db:SECTRACKid:1032645

Trust: 1.6

db:SECTRACKid:1032475

Trust: 1.6

db:SECTRACKid:1032656

Trust: 1.6

db:SECTRACKid:1034087

Trust: 1.6

db:SECTRACKid:1032648

Trust: 1.6

db:SECTRACKid:1033065

Trust: 1.6

db:SECTRACKid:1032856

Trust: 1.6

db:SECTRACKid:1033416

Trust: 1.6

db:SECTRACKid:1032864

Trust: 1.6

db:SECTRACKid:1033208

Trust: 1.6

db:SECTRACKid:1032702

Trust: 1.6

db:SECTRACKid:1033209

Trust: 1.6

db:SECTRACKid:1032655

Trust: 1.6

db:SECTRACKid:1032784

Trust: 1.6

db:SECTRACKid:1033991

Trust: 1.6

db:SECTRACKid:1033430

Trust: 1.6

db:SECTRACKid:1032778

Trust: 1.6

db:SECTRACKid:1032637

Trust: 1.6

db:SECTRACKid:1032884

Trust: 1.6

db:SECTRACKid:1033019

Trust: 1.6

db:SECTRACKid:1032960

Trust: 1.6

db:SECTRACKid:1032651

Trust: 1.6

db:SECTRACKid:1032783

Trust: 1.6

db:SECTRACKid:1032777

Trust: 1.6

db:SECTRACKid:1033760

Trust: 1.6

db:SECTRACKid:1032865

Trust: 1.6

db:SECTRACKid:1032727

Trust: 1.6

db:SECTRACKid:1033385

Trust: 1.6

db:SECTRACKid:1032474

Trust: 1.6

db:SECTRACKid:1033210

Trust: 1.6

db:SECTRACKid:1032652

Trust: 1.6

db:SECTRACKid:1032647

Trust: 1.6

db:SECTRACKid:1033433

Trust: 1.6

db:SECTRACKid:1033067

Trust: 1.6

db:SECTRACKid:1032910

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2015/05/20/8

Trust: 1.6

db:SIEMENSid:SSA-412672

Trust: 1.6

db:JUNIPERid:JSA10681

Trust: 1.6

db:JUNIPERid:JSA10727

Trust: 1.6

db:BIDid:91787

Trust: 1.6

db:BIDid:74733

Trust: 1.6

db:MCAFEEid:SB10122

Trust: 1.6

db:AUSCERTid:ESB-2022.0696

Trust: 0.6

db:AUSCERTid:ESB-2019.3475

Trust: 0.6

db:AUSCERTid:ESB-2023.1333

Trust: 0.6

db:CNNVDid:CNNVD-201505-428

Trust: 0.6

db:JUNIPERid:JSA10694

Trust: 0.3

db:BIDid:75652

Trust: 0.3

db:PACKETSTORMid:169661

Trust: 0.1

db:PACKETSTORMid:133344

Trust: 0.1

db:PACKETSTORMid:139002

Trust: 0.1

db:PACKETSTORMid:135510

Trust: 0.1

db:PACKETSTORMid:133338

Trust: 0.1

db:PACKETSTORMid:133324

Trust: 0.1

db:PACKETSTORMid:136182

Trust: 0.1

db:PACKETSTORMid:132804

Trust: 0.1

db:PACKETSTORMid:134755

Trust: 0.1

sources: BID: 75652 // PACKETSTORM: 169661 // PACKETSTORM: 133344 // PACKETSTORM: 139002 // PACKETSTORM: 135510 // PACKETSTORM: 133338 // PACKETSTORM: 133324 // PACKETSTORM: 136182 // PACKETSTORM: 132804 // PACKETSTORM: 134755 // CNNVD: CNNVD-201505-428 // NVD: CVE-2015-4000

REFERENCES

url:https://www.oracle.com/security-alerts/cpujan2021.html

Trust: 2.2

url:http://support.citrix.com/article/ctx201114

Trust: 2.2

url:http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

Trust: 1.9

url:http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html

Trust: 1.9

url:http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html

Trust: 1.9

url:https://security.gentoo.org/glsa/201603-11

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2015-1485.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-updates/2016-02/msg00097.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032960

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959636

Trust: 1.6

url:http://www.securitytracker.com/id/1033019

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959517

Trust: 1.6

url:http://www.securitytracker.com/id/1032727

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144102017024820&w=2

Trust: 1.6

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04953655

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21959132

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21960191

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21961717

Trust: 1.6

url:http://lists.apple.com/archives/security-announce/2015/jun/msg00002.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1197.html

Trust: 1.6

url:http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html

Trust: 1.6

url:http://www.securitytracker.com/id/1033385

Trust: 1.6

url:http://www.securitytracker.com/id/1032856

Trust: 1.6

url:http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc

Trust: 1.6

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05128722

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html

Trust: 1.6

url:http://www.securityfocus.com/bid/91787

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html

Trust: 1.6

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-june/159351.html

Trust: 1.6

url:http://www.ubuntu.com/usn/usn-2656-2

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959530

Trust: 1.6

url:https://openssl.org/news/secadv/20150611.txt

Trust: 1.6

url:http://www.ubuntu.com/usn/usn-2656-1

Trust: 1.6

url:http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032702

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04772190

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143637549705650&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144060576831314&w=2

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1072.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1241.html

Trust: 1.6

url:https://weakdh.org/imperfect-forward-secrecy.pdf

Trust: 1.6

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10681

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21958984

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143506486712441&w=2

Trust: 1.6

url:https://developer.mozilla.org/en-us/docs/mozilla/projects/nss/nss_3.19.1_release_notes

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21960380

Trust: 1.6

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbhf03831en_us

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1185.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144043644216842&w=2

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959195

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144050121701297&w=2

Trust: 1.6

url:http://www.securityfocus.com/bid/74733

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html

Trust: 1.6

url:http://www.debian.org/security/2015/dsa-3300

Trust: 1.6

url:http://www.securitytracker.com/id/1033222

Trust: 1.6

url:http://www.securitytracker.com/id/1033341

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=145409266329539&w=2

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959325

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html

Trust: 1.6

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10122

Trust: 1.6

url:http://www.securitytracker.com/id/1032932

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143880121627664&w=2

Trust: 1.6

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05193083

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1488.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1229.html

Trust: 1.6

url:http://www.debian.org/security/2015/dsa-3316

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1242.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21962739

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04926789

Trust: 1.6

url:http://lists.opensuse.org/opensuse-updates/2015-07/msg00016.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959453

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html

Trust: 1.6

url:https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/

Trust: 1.6

url:http://www.securitytracker.com/id/1033433

Trust: 1.6

url:http://www.securitytracker.com/id/1034884

Trust: 1.6

url:http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959539

Trust: 1.6

url:https://www.openssl.org/news/secadv_20150611.txt

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144104533800819&w=2

Trust: 1.6

url:http://openwall.com/lists/oss-security/2015/05/20/8

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21967893

Trust: 1.6

url:http://www.debian.org/security/2015/dsa-3324

Trust: 1.6

url:http://www.securitytracker.com/id/1032474

Trust: 1.6

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04876402

Trust: 1.6

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-june/160117.html

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144060606031437&w=2

Trust: 1.6

url:http://www.securitytracker.com/id/1032476

Trust: 1.6

url:http://www.securitytracker.com/id/1032475

Trust: 1.6

url:http://www.securitytracker.com/id/1033208

Trust: 1.6

url:http://www.securitytracker.com/id/1032910

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04923929

Trust: 1.6

url:http://www.securitytracker.com/id/1033209

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1243.html

Trust: 1.6

url:https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04718196

Trust: 1.6

url:https://security.gentoo.org/glsa/201701-46

Trust: 1.6

url:http://www.debian.org/security/2015/dsa-3339

Trust: 1.6

url:http://www.securitytracker.com/id/1033210

Trust: 1.6

url:http://www.securitytracker.com/id/1033416

Trust: 1.6

url:http://www.securitytracker.com/id/1032688

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21962816

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144061542602287&w=2

Trust: 1.6

url:http://lists.apple.com/archives/security-announce/2015/jun/msg00001.html

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959481

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04770140

Trust: 1.6

url:https://support.citrix.com/article/ctx216642

Trust: 1.6

url:http://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2015-008.txt.asc

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032699

Trust: 1.6

url:http://www.mozilla.org/security/announce/2015/mfsa2015-70.html

Trust: 1.6

url:http://www.solarwinds.com/documentation/storage/storagemanager/docs/releasenotes/releasenotes.htm

Trust: 1.6

url:http://support.apple.com/kb/ht204941

Trust: 1.6

url:http://support.apple.com/kb/ht204942

Trust: 1.6

url:http://www.securitytracker.com/id/1040630

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1604.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html

Trust: 1.6

url:https://bto.bluecoat.com/security-advisory/sa98

Trust: 1.6

url:http://www.securitytracker.com/id/1033430

Trust: 1.6

url:http://www.securitytracker.com/id/1034087

Trust: 1.6

url:http://lists.opensuse.org/opensuse-updates/2016-02/msg00094.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032784

Trust: 1.6

url:https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf

Trust: 1.6

url:http://www.securitytracker.com/id/1032783

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html

Trust: 1.6

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10727

Trust: 1.6

url:http://www.securitytracker.com/id/1033513

Trust: 1.6

url:http://www.securitytracker.com/id/1034728

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21960418

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04918839

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html

Trust: 1.6

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-june/159314.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2016-2056.html

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144493176821532&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143628304012255&w=2

Trust: 1.6

url:http://www.securitytracker.com/id/1033760

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html

Trust: 1.6

url:https://www-304.ibm.com/support/docview.wss?uid=swg21959745

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143655800220052&w=2

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959111

Trust: 1.6

url:http://www.securitytracker.com/id/1033891

Trust: 1.6

url:https://www.suse.com/security/cve/cve-2015-4000.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1228.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032884

Trust: 1.6

url:http://www.debian.org/security/2016/dsa-3688

Trust: 1.6

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04740527

Trust: 1.6

url:https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/

Trust: 1.6

url:http://www.securitytracker.com/id/1032647

Trust: 1.6

url:http://www.securitytracker.com/id/1032645

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1230.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032649

Trust: 1.6

url:http://www.securitytracker.com/id/1032648

Trust: 1.6

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098403

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143557934009303&w=2

Trust: 1.6

url:http://www.securitytracker.com/id/1033064

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1544.html

Trust: 1.6

url:http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032650

Trust: 1.6

url:http://www.securitytracker.com/id/1033067

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21960041

Trust: 1.6

url:https://security.gentoo.org/glsa/201512-10

Trust: 1.6

url:https://puppet.com/security/cve/cve-2015-4000

Trust: 1.6

url:http://www.securitytracker.com/id/1033065

Trust: 1.6

url:http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html

Trust: 1.6

url:http://www.securitytracker.com/id/1032654

Trust: 1.6

url:http://www.securitytracker.com/id/1032653

Trust: 1.6

url:http://www.securitytracker.com/id/1032652

Trust: 1.6

url:http://www.securitytracker.com/id/1032651

Trust: 1.6

url:http://www.securitytracker.com/id/1032778

Trust: 1.6

url:http://www.securitytracker.com/id/1032656

Trust: 1.6

url:http://www.securitytracker.com/id/1032777

Trust: 1.6

url:http://www.securitytracker.com/id/1036218

Trust: 1.6

url:http://www.securitytracker.com/id/1032655

Trust: 1.6

url:https://security.gentoo.org/glsa/201506-02

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21962455

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2016-1624.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04832246

Trust: 1.6

url:http://www.ubuntu.com/usn/usn-2673-1

Trust: 1.6

url:http://www.ubuntu.com/usn/usn-2696-1

Trust: 1.6

url:http://www.securitytracker.com/id/1033991

Trust: 1.6

url:https://security.netapp.com/advisory/ntap-20150619-0001/

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=144069189622016&w=2

Trust: 1.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21959812

Trust: 1.6

url:http://www.securitytracker.com/id/1032865

Trust: 1.6

url:http://www.securitytracker.com/id/1032864

Trust: 1.6

url:http://www.ubuntu.com/usn/usn-2706-1

Trust: 1.6

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05045763

Trust: 1.6

url:http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html

Trust: 1.6

url:https://bugzilla.mozilla.org/show_bug.cgi?id=1138554

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773119

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1486.html

Trust: 1.6

url:http://www.debian.org/security/2015/dsa-3287

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=143558092609708&w=2

Trust: 1.6

url:http://www.securitytracker.com/id/1032871

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html

Trust: 1.6

url:https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes

Trust: 1.6

url:http://www.securitytracker.com/id/1032759

Trust: 1.6

url:http://www.securitytracker.com/id/1032637

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html

Trust: 1.6

url:http://www.fortiguard.com/advisory/2015-05-20-logjam-attack

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2015-1526.html

Trust: 1.6

url:http://www-304.ibm.com/support/docview.wss?uid=swg21960194

Trust: 1.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773241

Trust: 1.6

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04949778

Trust: 1.6

url:https://weakdh.org/

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2015-4000

Trust: 0.9

url:https://www.auscert.org.au/bulletins/esb-2022.0696

Trust: 0.6

url:https://www.ibm.com/support/docview.wss?uid=ibm11073000

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1333

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-spectrum-protect-backup-archive-client-web-user-interface-ibm-spectrum-protect-for-space-management-and-ibm-spectrum-protect-for-virtual-environments-are-vulnerabile-to-logjam/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-spectrum-protect-plus-vulnerable-to-logjam-cve-2015-4000/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.3475/

Trust: 0.6

url:https://mta.openssl.org/pipermail/openssl-announce/2015-july/000037.html

Trust: 0.3

url:http://openssl.org/

Trust: 0.3

url:https://support.asperasoft.com/entries/94843988-security-bulletin-openssl-,-tls-vulnerabilities-logjam-cve-2015-4000

Trust: 0.3

url:http://seclists.org/bugtraq/2015/aug/13

Trust: 0.3

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10694

Trust: 0.3

url:https://www.openssl.org/news/secadv_20150709.txt

Trust: 0.3

url:http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html

Trust: 0.3

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04822825

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05184351

Trust: 0.3

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150710-openssl

Trust: 0.3

url:http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-454058.htm

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21962519

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21964231

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21965399

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=nas8n1020840

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21961179

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21962398

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21962929

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21963448

Trust: 0.3

url:https://www.openssl.org/news/vulnerabilities.html#2015-1793

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21963498

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21966481

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21966484

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21965725

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21965807

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.3

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.3

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/

Trust: 0.3

url:https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea

Trust: 0.2

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.2

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2664

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2619

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2601

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2638

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2632

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2621

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2590

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2625

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2613

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-2637

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3197

Trust: 0.1

url:https://www.openssl.org/policies/secpolicy.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-0701

Trust: 0.1

url:https://www.openssl.org/news/secadv/20160128.txt

Trust: 0.1

url:https://www.openssl.org/policies/releasestrat.html),

Trust: 0.1

url:https://softwaresupport.hp.com/group/softwaresupport/search-result/-/fa

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2808

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2834

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1979

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1938

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7182

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1950

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1978

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7181

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7575

Trust: 0.1

url:https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facets

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4734

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2621

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2627

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0458

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0492

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0458

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2659

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0470

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4911

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4732

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4906

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4882

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4908

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0488

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4868

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4902

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0484

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4835

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0488

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4903

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2637

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4844

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4736

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4842

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0480

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2659

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4760

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4810

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0437

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0469

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0480

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0437

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2627

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4893

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2590

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0478

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4916

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0459

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0469

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2613

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2601

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2628

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0460

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2619

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4871

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0478

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2628

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0459

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0486

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2638

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4733

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0492

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4805

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0470

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4748

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7840

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4901

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4881

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4806

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4000

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0477

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2625

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4803

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0477

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0491

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4840

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0491

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4729

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4872

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0486

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4843

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4860

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0460

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2664

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0484

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2632

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4731

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4883

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4732

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4760

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2621

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2601

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4732

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2613

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4729

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4760

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2632

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4000

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2664

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4736

Trust: 0.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-1931

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4733

Trust: 0.1

url:http://www.ibm.com/developerworks/java/jdk/alerts/

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4736

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4748

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4731

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2625

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4729

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2638

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4749

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1931

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2619

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4733

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4749

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2590

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-2637

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4731

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4748

Trust: 0.1

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n

Trust: 0.1

sources: BID: 75652 // PACKETSTORM: 169661 // PACKETSTORM: 133344 // PACKETSTORM: 139002 // PACKETSTORM: 135510 // PACKETSTORM: 133338 // PACKETSTORM: 133324 // PACKETSTORM: 136182 // PACKETSTORM: 132804 // PACKETSTORM: 134755 // CNNVD: CNNVD-201505-428 // NVD: CVE-2015-4000

CREDITS

HP

Trust: 0.4

sources: PACKETSTORM: 133344 // PACKETSTORM: 135510 // PACKETSTORM: 133338 // PACKETSTORM: 133324

SOURCES

db:BIDid:75652
db:PACKETSTORMid:169661
db:PACKETSTORMid:133344
db:PACKETSTORMid:139002
db:PACKETSTORMid:135510
db:PACKETSTORMid:133338
db:PACKETSTORMid:133324
db:PACKETSTORMid:136182
db:PACKETSTORMid:132804
db:PACKETSTORMid:134755
db:CNNVDid:CNNVD-201505-428
db:NVDid:CVE-2015-4000

LAST UPDATE DATE

2025-04-01T21:35:52.895000+00:00


SOURCES UPDATE DATE

db:BIDid:75652date:2016-10-26T05:10:00
db:CNNVDid:CNNVD-201505-428date:2023-03-03T00:00:00
db:NVDid:CVE-2015-4000date:2024-11-21T02:30:14.667

SOURCES RELEASE DATE

db:BIDid:75652date:2015-07-09T00:00:00
db:PACKETSTORMid:169661date:2016-01-28T12:12:12
db:PACKETSTORMid:133344date:2015-08-27T13:19:00
db:PACKETSTORMid:139002date:2016-10-06T20:59:47
db:PACKETSTORMid:135510date:2016-01-29T20:33:00
db:PACKETSTORMid:133338date:2015-08-26T23:42:39
db:PACKETSTORMid:133324date:2015-08-26T01:35:03
db:PACKETSTORMid:136182date:2016-03-14T14:43:36
db:PACKETSTORMid:132804date:2015-07-22T22:39:35
db:PACKETSTORMid:134755date:2015-12-10T17:24:11
db:CNNVDid:CNNVD-201505-428date:2015-05-21T00:00:00
db:NVDid:CVE-2015-4000date:2015-05-21T00:59:00.087