5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
6.8 Medium
AI Score
Confidence
Low
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.003 Low
EPSS
Percentile
68.5%
Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.
CPE | Name | Operator | Version |
---|---|---|---|
ubuntu_linux | eq | 15.10 | |
ubuntu_linux | eq | 14.04 | |
ubuntu_linux | eq | 15.04 | |
firefox | le | 43.0.1 | |
firefox_esr | eq | 38.0 | |
firefox_esr | eq | 38.2.1 | |
firefox_esr | eq | 38.1.0 | |
firefox_esr | eq | 38.2.0 | |
firefox_esr | eq | 38.4.0 | |
firefox_esr | eq | 38.3.0 |
lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
lists.opensuse.org/opensuse-updates/2015-12/msg00139.html
lists.opensuse.org/opensuse-updates/2016-01/msg00005.html
lists.opensuse.org/opensuse-updates/2016-01/msg00058.html
lists.opensuse.org/opensuse-updates/2016-01/msg00059.html
lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
lists.opensuse.org/opensuse-updates/2016-02/msg00166.html
rhn.redhat.com/errata/RHSA-2016-0049.html
rhn.redhat.com/errata/RHSA-2016-0050.html
rhn.redhat.com/errata/RHSA-2016-0053.html
rhn.redhat.com/errata/RHSA-2016-0054.html
rhn.redhat.com/errata/RHSA-2016-0055.html
rhn.redhat.com/errata/RHSA-2016-0056.html
www.debian.org/security/2016/dsa-3436
www.debian.org/security/2016/dsa-3437
www.debian.org/security/2016/dsa-3457
www.debian.org/security/2016/dsa-3458
www.debian.org/security/2016/dsa-3465
www.debian.org/security/2016/dsa-3491
www.debian.org/security/2016/dsa-3688
www.mozilla.org/security/announce/2015/mfsa2015-150.html
www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
www.securityfocus.com/bid/79684
www.securityfocus.com/bid/91787
www.securitytracker.com/id/1034541
www.securitytracker.com/id/1036467
www.ubuntu.com/usn/USN-2863-1
www.ubuntu.com/usn/USN-2864-1
www.ubuntu.com/usn/USN-2865-1
www.ubuntu.com/usn/USN-2866-1
www.ubuntu.com/usn/USN-2884-1
www.ubuntu.com/usn/USN-2904-1
access.redhat.com/errata/RHSA-2016:1430
bugzilla.mozilla.org/show_bug.cgi?id=1158489
developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes
security.gentoo.org/glsa/201701-46
security.gentoo.org/glsa/201706-18
security.gentoo.org/glsa/201801-15
security.netapp.com/advisory/ntap-20160225-0001/
5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
6.8 Medium
AI Score
Confidence
Low
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.003 Low
EPSS
Percentile
68.5%