ID CVE-2015-3276
Summary The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors.
References
Vulnerable Configurations
  • cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*
    cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 15-10-2016 - 02:01)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
redhat via4
advisories
bugzilla
id 1245279
title OpenLDAP doesn't use sane (or default) cipher order
oval
AND
  • OR
    • comment Red Hat Enterprise Linux 7 Client is installed
      oval oval:com.redhat.rhba:tst:20150364001
    • comment Red Hat Enterprise Linux 7 Server is installed
      oval oval:com.redhat.rhba:tst:20150364002
    • comment Red Hat Enterprise Linux 7 Workstation is installed
      oval oval:com.redhat.rhba:tst:20150364003
    • comment Red Hat Enterprise Linux 7 ComputeNode is installed
      oval oval:com.redhat.rhba:tst:20150364004
  • OR
    • AND
      • comment openldap is earlier than 0:2.4.40-8.el7
        oval oval:com.redhat.rhsa:tst:20152131011
      • comment openldap is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhba:tst:20151292008
    • AND
      • comment openldap-clients is earlier than 0:2.4.40-8.el7
        oval oval:com.redhat.rhsa:tst:20152131009
      • comment openldap-clients is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhba:tst:20151292010
    • AND
      • comment openldap-devel is earlier than 0:2.4.40-8.el7
        oval oval:com.redhat.rhsa:tst:20152131005
      • comment openldap-devel is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhba:tst:20151292012
    • AND
      • comment openldap-servers is earlier than 0:2.4.40-8.el7
        oval oval:com.redhat.rhsa:tst:20152131013
      • comment openldap-servers is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhba:tst:20151292014
    • AND
      • comment openldap-servers-sql is earlier than 0:2.4.40-8.el7
        oval oval:com.redhat.rhsa:tst:20152131007
      • comment openldap-servers-sql is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhba:tst:20151292006
rhsa
id RHSA-2015:2131
released 2015-11-19
severity Moderate
title RHSA-2015:2131: openldap security, bug fix, and enhancement update (Moderate)
rpms
  • openldap-0:2.4.40-8.el7
  • openldap-clients-0:2.4.40-8.el7
  • openldap-devel-0:2.4.40-8.el7
  • openldap-servers-0:2.4.40-8.el7
  • openldap-servers-sql-0:2.4.40-8.el7
refmap via4
confirm
sectrack 1034221
Last major update 15-10-2016 - 02:01
Published 07-12-2015 - 20:59
Back to Top