ID

VAR-201609-0068


CVE

CVE-2015-8960


TITLE

TLS In the protocol TLS Vulnerability impersonating a server

Trust: 0.8

sources: JVNDB: JVNDB-2015-007257

DESCRIPTION

The TLS protocol 1.2 and earlier supports the rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh, and ecdsa_fixed_ecdh values for ClientCertificateType but does not directly document the ability to compute the master secret in certain situations with a client secret key and server public key but not a server secret key, which makes it easier for man-in-the-middle attackers to spoof TLS servers by leveraging knowledge of the secret key for an arbitrary installed client X.509 certificate, aka the "Key Compromise Impersonation (KCI)" issue. TLS is prone to security-bypass vulnerability. Successfully exploiting this issue may allow attackers to perform unauthorized actions by conducting a man-in-the-middle attack. This may lead to other attacks. TLS (full name Transport Layer Security) protocol is a set of protocols used to provide confidentiality and data integrity between two communication applications. There are security holes in TLS protocol 1.2 and earlier versions

Trust: 2.07

sources: NVD: CVE-2015-8960 // JVNDB: JVNDB-2015-007257 // BID: 93071 // VULHUB: VHN-86921 // VULMON: CVE-2015-8960

AFFECTED PRODUCTS

vendor:netappmodel:smi-s providerscope:eqversion: -

Trust: 1.0

vendor:netappmodel:host agentscope:eqversion: -

Trust: 1.0

vendor:netappmodel:solidfire \& hci management nodescope:eqversion: -

Trust: 1.0

vendor:ietfmodel:transport layer securityscope:lteversion:1.2

Trust: 1.0

vendor:netappmodel:snapdrivescope:eqversion: -

Trust: 1.0

vendor:netappmodel:clustered data ontap antivirus connectorscope:eqversion: -

Trust: 1.0

vendor:netappmodel:system setupscope:eqversion: -

Trust: 1.0

vendor:netappmodel:oncommand shiftscope:eqversion: -

Trust: 1.0

vendor:netappmodel:plug-in for symantec netbackupscope:eqversion: -

Trust: 1.0

vendor:netappmodel:data ontap edgescope:eqversion: -

Trust: 1.0

vendor:netappmodel:snapprotectscope:eqversion: -

Trust: 1.0

vendor:netappmodel:snapmanagerscope:eqversion: -

Trust: 1.0

vendor:netappmodel:snap creator frameworkscope:eqversion: -

Trust: 1.0

vendor:googlemodel:chromescope: - version: -

Trust: 0.8

vendor:mozillamodel:firefoxscope: - version: -

Trust: 0.8

vendor:opera asamodel:operascope: - version: -

Trust: 0.8

vendor:applemodel:safariscope: - version: -

Trust: 0.8

vendor:microsoftmodel:internet explorerscope: - version: -

Trust: 0.8

vendor:operamodel:operascope: - version: -

Trust: 0.6

vendor:ietfmodel:tlsscope:eqversion:1.2

Trust: 0.3

vendor:ietfmodel:tlsscope:eqversion:1.1

Trust: 0.3

vendor:ietfmodel:tlsscope:eqversion:1.0

Trust: 0.3

sources: BID: 93071 // JVNDB: JVNDB-2015-007257 // CNNVD: CNNVD-201609-496 // NVD: CVE-2015-8960

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-8960
value: HIGH

Trust: 1.0

NVD: CVE-2015-8960
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201609-496
value: HIGH

Trust: 0.6

VULHUB: VHN-86921
value: MEDIUM

Trust: 0.1

VULMON: CVE-2015-8960
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-8960
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-86921
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-8960
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2015-8960
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-86921 // VULMON: CVE-2015-8960 // JVNDB: JVNDB-2015-007257 // CNNVD: CNNVD-201609-496 // NVD: CVE-2015-8960

PROBLEMTYPE DATA

problemtype:CWE-295

Trust: 1.1

problemtype:CWE-310

Trust: 0.9

sources: VULHUB: VHN-86921 // JVNDB: JVNDB-2015-007257 // NVD: CVE-2015-8960

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201609-496

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-201609-496

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-007257

PATCH

title:Google Chromeurl:https://www.google.com/intl/ja/chrome/browser/features.html

Trust: 0.8

title:Firefoxurl:https://www.mozilla.org/ja/firefox/desktop/

Trust: 0.8

title:Operaurl:http://www.opera.com/ja

Trust: 0.8

title:Safariurl:http://www.apple.com/jp/safari/

Trust: 0.8

title:Internet Explorerurl:https://support.microsoft.com/ja-jp/products/internet-explorer

Trust: 0.8

title:TLS protocol Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=64220

Trust: 0.6

sources: JVNDB: JVNDB-2015-007257 // CNNVD: CNNVD-201609-496

EXTERNAL IDS

db:NVDid:CVE-2015-8960

Trust: 2.9

db:BIDid:93071

Trust: 2.1

db:OPENWALLid:OSS-SECURITY/2016/09/20/4

Trust: 1.8

db:JVNDBid:JVNDB-2015-007257

Trust: 0.8

db:CNNVDid:CNNVD-201609-496

Trust: 0.7

db:VULHUBid:VHN-86921

Trust: 0.1

db:VULMONid:CVE-2015-8960

Trust: 0.1

sources: VULHUB: VHN-86921 // VULMON: CVE-2015-8960 // BID: 93071 // JVNDB: JVNDB-2015-007257 // CNNVD: CNNVD-201609-496 // NVD: CVE-2015-8960

REFERENCES

url:http://twitter.com/matthew_d_green/statuses/630908726950674433

Trust: 2.6

url:https://www.usenix.org/system/files/conference/woot15/woot15-paper-hlauschek.pdf

Trust: 2.6

url:http://www.securityfocus.com/bid/93071

Trust: 1.9

url:https://security.netapp.com/advisory/ntap-20180626-0002/

Trust: 1.8

url:https://kcitls.org

Trust: 1.8

url:http://www.openwall.com/lists/oss-security/2016/09/20/4

Trust: 1.8

url:https://kcitls.org/

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8960

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8960

Trust: 0.8

url:http://seclists.org/oss-sec/2016/q3/576

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/310.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-86921 // VULMON: CVE-2015-8960 // BID: 93071 // JVNDB: JVNDB-2015-007257 // CNNVD: CNNVD-201609-496 // NVD: CVE-2015-8960

CREDITS

RISE GmbH

Trust: 0.3

sources: BID: 93071

SOURCES

db:VULHUBid:VHN-86921
db:VULMONid:CVE-2015-8960
db:BIDid:93071
db:JVNDBid:JVNDB-2015-007257
db:CNNVDid:CNNVD-201609-496
db:NVDid:CVE-2015-8960

LAST UPDATE DATE

2024-11-23T22:30:57.799000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-86921date:2023-01-30T00:00:00
db:VULMONid:CVE-2015-8960date:2018-06-28T00:00:00
db:BIDid:93071date:2016-10-03T00:02:00
db:JVNDBid:JVNDB-2015-007257date:2016-09-27T00:00:00
db:CNNVDid:CNNVD-201609-496date:2023-02-01T00:00:00
db:NVDid:CVE-2015-8960date:2024-11-21T02:39:32.840

SOURCES RELEASE DATE

db:VULHUBid:VHN-86921date:2016-09-21T00:00:00
db:VULMONid:CVE-2015-8960date:2016-09-21T00:00:00
db:BIDid:93071date:2016-09-19T00:00:00
db:JVNDBid:JVNDB-2015-007257date:2016-09-27T00:00:00
db:CNNVDid:CNNVD-201609-496date:2016-09-21T00:00:00
db:NVDid:CVE-2015-8960date:2016-09-21T02:59:00.133