CVE-2015-7575
Public on 2016-01-09
Modified on 2016-04-28
Description
A flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client.
Severity
CVSS v3 Base Score
See breakdown
Affected Packages
Platform | Package | Release Date | Advisory | Status |
---|---|---|---|---|
Amazon Linux 1 | gnutls | 2016-02-09 | ALAS-2016-651 | Fixed |
Amazon Linux 1 | java-1.7.0-openjdk | 2016-02-09 | ALAS-2016-643 | Fixed |
Amazon Linux 1 | java-1.8.0-openjdk | 2016-02-09 | ALAS-2016-647 | Fixed |
Amazon Linux 1 | nss | 2016-02-09 | ALAS-2016-645 | Fixed |
Amazon Linux 1 | openssl | 2016-03-10 | ALAS-2016-661 | Fixed |
CVSS Scores
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv2 | 5.8 | AV:N/AC:M/Au:N/C:P/I:P/A:N |
NVD | CVSSv2 | 4.3 | AV:N/AC:M/Au:N/C:N/I:P/A:N |
NVD | CVSSv3 | 5.9 | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |