5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.003 Low
EPSS
Percentile
68.9%
Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla
Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject
MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake
Protocol traffic, which makes it easier for man-in-the-middle attackers to
spoof servers by triggering a collision.
Author | Note |
---|---|
mdeslaur | This is called “SLOTH” |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 17.10 | noarch | firefox | < 43.0.4+build3-0ubuntu1 | UNKNOWN |
ubuntu | 18.04 | noarch | firefox | < 43.0.4+build3-0ubuntu1 | UNKNOWN |
ubuntu | 18.10 | noarch | firefox | < 43.0.4+build3-0ubuntu1 | UNKNOWN |
ubuntu | 19.04 | noarch | firefox | < 43.0.4+build3-0ubuntu1 | UNKNOWN |
ubuntu | 12.04 | noarch | firefox | < 43.0.4+build3-0ubuntu0.12.04.1 | UNKNOWN |
ubuntu | 14.04 | noarch | firefox | < 43.0.4+build3-0ubuntu0.14.04.1 | UNKNOWN |
ubuntu | 15.04 | noarch | firefox | < 43.0.4+build3-0ubuntu0.15.04.1 | UNKNOWN |
ubuntu | 15.10 | noarch | firefox | < 43.0.4+build3-0ubuntu0.15.10.1 | UNKNOWN |
ubuntu | 16.04 | noarch | firefox | < 43.0.4+build3-0ubuntu1 | UNKNOWN |
ubuntu | 16.10 | noarch | firefox | < 43.0.4+build3-0ubuntu1 | UNKNOWN |
blog.fuseyism.com/index.php/2016/01/25/security-icedtea-1-13-10-for-openjdk-6-released/
lists.gnutls.org/pipermail/gnutls-devel/2015-April/007572.html
www.gnutls.org/security.html#GNUTLS-SA-2015-2
www.mitls.org/pages/attacks/SLOTH
launchpad.net/bugs/cve/CVE-2015-7575
nvd.nist.gov/vuln/detail/CVE-2015-7575
security-tracker.debian.org/tracker/CVE-2015-7575
tls.mbed.org/tech-updates/releases/mbedtls-2.2.1-2.1.4-1.3.16-and-polarssl.1.2.19-released
ubuntu.com/security/notices/USN-2863-1
ubuntu.com/security/notices/USN-2864-1
ubuntu.com/security/notices/USN-2865-1
ubuntu.com/security/notices/USN-2866-1
ubuntu.com/security/notices/USN-2884-1
ubuntu.com/security/notices/USN-2904-1
www.cve.org/CVERecord?id=CVE-2015-7575
www.mozilla.org/en-US/security/advisories/mfsa2015-150/
5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.003 Low
EPSS
Percentile
68.9%