CentOS Update for nss CESA-2015:1664 centos5, fixing TLS/SSL connection and signature forgery vulnerabilitie
Reporter | Title | Published | Views | Family All 143 |
---|---|---|---|---|
![]() | RHEL 5 : nss (RHSA-2015:1664) | 25 Aug 201500:00 | – | nessus |
![]() | Oracle Linux 5 : nss (ELSA-2015-1664) | 25 Aug 201500:00 | – | nessus |
![]() | Debian DLA-315-1 : nss security update | 28 Sep 201500:00 | – | nessus |
![]() | CentOS 5 : nss (CESA-2015:1664) | 26 Aug 201500:00 | – | nessus |
![]() | Debian DSA-3336-1 : nss - security update | 18 Aug 201500:00 | – | nessus |
![]() | Scientific Linux Security Update : nss on SL5.x i386/x86_64 (20150824) | 25 Aug 201500:00 | – | nessus |
![]() | Ubuntu 14.04 LTS : NSS vulnerabilities (USN-2672-1) | 13 Jul 201500:00 | – | nessus |
![]() | Amazon Linux AMI : nss-softokn (ALAS-2015-596) | 23 Sep 201500:00 | – | nessus |
![]() | Scientific Linux Security Update : nss-softokn on SL6.x, SL7.x i386/x86_64 (20150901) | 3 Sep 201500:00 | – | nessus |
![]() | CentOS 6 / 7 : nss-softokn (CESA-2015:1699) | 22 Oct 201500:00 | – | nessus |
# SPDX-FileCopyrightText: 2015 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.882256");
script_version("2023-07-11T05:06:07+0000");
script_cve_id("CVE-2015-2721", "CVE-2015-2730");
script_tag(name:"cvss_base", value:"4.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:P/A:N");
script_tag(name:"last_modification", value:"2023-07-11 05:06:07 +0000 (Tue, 11 Jul 2023)");
script_tag(name:"creation_date", value:"2015-08-26 09:18:51 +0200 (Wed, 26 Aug 2015)");
script_tag(name:"qod_type", value:"package");
script_name("CentOS Update for nss CESA-2015:1664 centos5");
script_tag(name:"summary", value:"Check the version of nss");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"Network Security Services (NSS) is a set of libraries designed to support
cross-platform development of security-enabled client and server
applications.
It was found that NSS permitted skipping of the ServerKeyExchange packet
during a handshake involving ECDHE (Elliptic Curve Diffie-Hellman key
Exchange). A remote attacker could use this flaw to bypass the
forward-secrecy of a TLS/SSL connection. (CVE-2015-2721)
A flaw was found in the way NSS verified certain ECDSA (Elliptic Curve
Digital Signature Algorithm) signatures. Under certain conditions, an
attacker could use this flaw to conduct signature forgery attacks.
(CVE-2015-2730)
Red Hat would like to thank the Mozilla project for reporting this issue.
Upstream acknowledges Karthikeyan Bhargavan as the original reporter of
CVE-2015-2721, and Watson Ladd as the original reporter of CVE-2015-2730.
The nss packages have been upgraded to upstream version 3.19.1, which
provides a number of bug fixes and enhancements over the previous version.
All nss users are advised to upgrade to these updated packages, which
correct these issues.");
script_tag(name:"affected", value:"nss on CentOS 5");
script_tag(name:"solution", value:"Please install the updated packages.");
script_xref(name:"CESA", value:"2015:1664");
script_xref(name:"URL", value:"http://lists.centos.org/pipermail/centos-announce/2015-August/021343.html");
script_tag(name:"solution_type", value:"VendorFix");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2015 Greenbone AG");
script_family("CentOS Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/centos", "ssh/login/rpms", re:"ssh/login/release=CentOS5");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
if(release == "CentOS5")
{
if ((res = isrpmvuln(pkg:"nss", rpm:"nss~3.19.1~1.el5_11", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"nss-devel", rpm:"nss-devel~3.19.1~1.el5_11", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"nss-pkcs11-devel", rpm:"nss-pkcs11-devel~3.19.1~1.el5_11", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"nss-tools", rpm:"nss-tools~3.19.1~1.el5_11", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99);
exit(0);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo