ID CVE-2015-2721
Summary Mozilla Network Security Services (NSS) before 3.19, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, Thunderbird before 38.1, and other products, does not properly determine state transitions for the TLS state machine, which allows man-in-the-middle attackers to defeat cryptographic protection mechanisms by blocking messages, as demonstrated by removing a forward-secrecy property by blocking a ServerKeyExchange message, aka a "SMACK SKIP-TLS" issue.
References
Vulnerable Configurations
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
    cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
  • cpe:2.3:o:novell:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*
    cpe:2.3:o:novell:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
    cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
    cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:network_security_services:3.19:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:network_security_services:3.19:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox_esr:31.5:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox_esr:31.5:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox_esr:31.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox_esr:31.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox_esr:31.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox_esr:31.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
  • cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
    cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
  • cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*
    cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 12-09-2023 - 14:55)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:P/A:N
redhat via4
advisories
  • rhsa
    id RHSA-2015:1185
  • rhsa
    id RHSA-2015:1664
rpms
  • nss-0:3.19.1-3.ael7b_1
  • nss-0:3.19.1-3.el6_6
  • nss-0:3.19.1-3.el7_1
  • nss-debuginfo-0:3.19.1-3.ael7b_1
  • nss-debuginfo-0:3.19.1-3.el6_6
  • nss-debuginfo-0:3.19.1-3.el7_1
  • nss-devel-0:3.19.1-3.ael7b_1
  • nss-devel-0:3.19.1-3.el6_6
  • nss-devel-0:3.19.1-3.el7_1
  • nss-pkcs11-devel-0:3.19.1-3.ael7b_1
  • nss-pkcs11-devel-0:3.19.1-3.el6_6
  • nss-pkcs11-devel-0:3.19.1-3.el7_1
  • nss-sysinit-0:3.19.1-3.ael7b_1
  • nss-sysinit-0:3.19.1-3.el6_6
  • nss-sysinit-0:3.19.1-3.el7_1
  • nss-tools-0:3.19.1-3.ael7b_1
  • nss-tools-0:3.19.1-3.el6_6
  • nss-tools-0:3.19.1-3.el7_1
  • nss-util-0:3.19.1-1.ael7b_1
  • nss-util-0:3.19.1-1.el6_6
  • nss-util-0:3.19.1-1.el7_1
  • nss-util-debuginfo-0:3.19.1-1.ael7b_1
  • nss-util-debuginfo-0:3.19.1-1.el6_6
  • nss-util-debuginfo-0:3.19.1-1.el7_1
  • nss-util-devel-0:3.19.1-1.ael7b_1
  • nss-util-devel-0:3.19.1-1.el6_6
  • nss-util-devel-0:3.19.1-1.el7_1
  • nss-0:3.19.1-1.el5_11
  • nss-debuginfo-0:3.19.1-1.el5_11
  • nss-devel-0:3.19.1-1.el5_11
  • nss-pkcs11-devel-0:3.19.1-1.el5_11
  • nss-tools-0:3.19.1-1.el5_11
refmap via4
bid
  • 75541
  • 83398
  • 91787
confirm
debian
  • DSA-3324
  • DSA-3336
gentoo
  • GLSA-201512-10
  • GLSA-201701-46
misc https://smacktls.com
sectrack
  • 1032783
  • 1032784
suse
  • SUSE-SU-2015:1268
  • SUSE-SU-2015:1269
  • SUSE-SU-2015:1449
  • openSUSE-SU-2015:1229
  • openSUSE-SU-2015:1266
ubuntu
  • USN-2656-1
  • USN-2656-2
  • USN-2672-1
  • USN-2673-1
Last major update 12-09-2023 - 14:55
Published 06-07-2015 - 02:00
Last modified 12-09-2023 - 14:55
Back to Top