ID CVE-2015-3276
Summary The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors.
References
Vulnerable Configurations
  • cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*
    cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 15-10-2016 - 02:01)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
redhat via4
advisories
bugzilla
id 1245279
title OpenLDAP doesn't use sane (or default) cipher order
oval
OR
  • comment Red Hat Enterprise Linux must be installed
    oval oval:com.redhat.rhba:tst:20070304026
  • AND
    • comment Red Hat Enterprise Linux 7 is installed
      oval oval:com.redhat.rhba:tst:20150364027
    • OR
      • AND
        • comment openldap is earlier than 0:2.4.40-8.el7
          oval oval:com.redhat.rhsa:tst:20152131001
        • comment openldap is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20151292002
      • AND
        • comment openldap-clients is earlier than 0:2.4.40-8.el7
          oval oval:com.redhat.rhsa:tst:20152131003
        • comment openldap-clients is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20151292004
      • AND
        • comment openldap-devel is earlier than 0:2.4.40-8.el7
          oval oval:com.redhat.rhsa:tst:20152131005
        • comment openldap-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20151292006
      • AND
        • comment openldap-servers is earlier than 0:2.4.40-8.el7
          oval oval:com.redhat.rhsa:tst:20152131007
        • comment openldap-servers is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20151292008
      • AND
        • comment openldap-servers-sql is earlier than 0:2.4.40-8.el7
          oval oval:com.redhat.rhsa:tst:20152131009
        • comment openldap-servers-sql is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20151292010
rhsa
id RHSA-2015:2131
released 2015-11-19
severity Moderate
title RHSA-2015:2131: openldap security, bug fix, and enhancement update (Moderate)
rpms
  • openldap-0:2.4.40-8.el7
  • openldap-clients-0:2.4.40-8.el7
  • openldap-debuginfo-0:2.4.40-8.el7
  • openldap-devel-0:2.4.40-8.el7
  • openldap-servers-0:2.4.40-8.el7
  • openldap-servers-sql-0:2.4.40-8.el7
refmap via4
confirm
sectrack 1034221
Last major update 15-10-2016 - 02:01
Published 07-12-2015 - 20:59
Last modified 15-10-2016 - 02:01
Back to Top