wid-sec-w-2023-0428
Vulnerability from csaf_certbund
Published
2016-01-06 23:00
Modified
2024-09-01 22:00
Summary
Verschiedene TLS-Implementierungen: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Firefox und Mozilla sind Open Source Web Browser. ESR ist die Variante mit verlängertem Support.
Network Security Services (NSS) ist eine Sammlung von Bibliotheken um bei plattform übergreifenden Entwicklungen Securityfunktionalitäten für Clients und Server bereitzustellen.
GnuTLS (GNU Transport Layer Security Library) ist eine im Quelltext frei verfügbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.
OpenSSL ist eine im Quelltext frei verfügbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.
Die Java Platform, Standard Edition (SE) ist eine Sammlung von Java-APIs (JDK) und der Java Laufzeit Umgebung (JRE).
Die Produkte der Red Hat Enterprise Linux Produktfamilie sind Linux-Distribution der Firma Red Hat.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in verschiedenen TLS-Implementierungen ausnutzen, um Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme
- Appliance
- Linux
- MacOS X
- Sonstiges
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Firefox und Mozilla sind Open Source Web Browser. ESR ist die Variante mit verl\u00e4ngertem Support.\r\nNetwork Security Services (NSS) ist eine Sammlung von Bibliotheken um bei plattform \u00fcbergreifenden Entwicklungen Securityfunktionalit\u00e4ten f\u00fcr Clients und Server bereitzustellen.\r\nGnuTLS (GNU Transport Layer Security Library) ist eine im Quelltext frei verf\u00fcgbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.\r\nOpenSSL ist eine im Quelltext frei verf\u00fcgbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.\r\nDie Java Platform, Standard Edition (SE) ist eine Sammlung von Java-APIs (JDK) und der Java Laufzeit Umgebung (JRE).\r\nDie Produkte der Red Hat Enterprise Linux Produktfamilie sind Linux-Distribution der Firma Red Hat.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in verschiedenen TLS-Implementierungen ausnutzen, um Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Appliance\n- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0428 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2016/wid-sec-w-2023-0428.json" }, { "category": "self", "summary": "WID-SEC-2023-0428 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0428" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0149-1 vom 2016-01-18", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160149-1.html" }, { "category": "external", "summary": "Mozilla Security Advisory MFSA2015-150 vom 2016-01-06", "url": "https://www.mozilla.org/security/advisories/mfsa2015-150/" }, { "category": "external", "summary": "Security Losses from Obsolete and Truncated Transcript Hashes vom 2016-01-06", "url": "http://www.mitls.org/pages/attacks/SLOTH" }, { "category": "external", "summary": "GnuTLS Security Advisory GNUTLS-SA-2015-2 vom 2016-01-06", "url": "http://www.gnutls.org/security.html" }, { "category": "external", "summary": "Red Hat CVE-2015-7575 vom 2016-01-06", "url": "https://access.redhat.com/security/cve/cve-2015-7575" }, { "category": "external", "summary": "Red Hat Artikel \"SLOTH: TLS 1.2 vulnerability\" vom 2016-01-06", "url": "https://access.redhat.com/articles/2112261" }, { "category": "external", "summary": "Red Hat Bugzilla Bug 1289841 vom 2016-01-06", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1289841" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2016:0012 vom 2016-01-07", "url": "https://rhn.redhat.com/errata/RHSA-2016-0012.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2016:0008 vom 2016-01-07", "url": "https://rhn.redhat.com/errata/RHSA-2016-0008.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2016:0007 vom 2016-01-07", "url": "https://rhn.redhat.com/errata/RHSA-2016-0007.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-2863-1 vom 2016-01-07", "url": "http://www.ubuntu.com/usn/usn-2863-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-2864-1 vom 2016-01-07", "url": "http://www.ubuntu.com/usn/usn-2864-1/" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2016:0007 vom 2016-01-07", "url": "https://lists.centos.org/pipermail/centos-announce/2016-January/021602.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2016:0007 vom 2016-01-07", "url": "https://lists.centos.org/pipermail/centos-announce/2016-January/021594.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2016:0012 vom 2016-01-07", "url": "https://lists.centos.org/pipermail/centos-announce/2016-January/021596.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2016:0012 vom 2016-01-07", "url": "https://lists.centos.org/pipermail/centos-announce/2016-January/021600.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2016:0008 vom 2016-01-07", "url": "https://lists.centos.org/pipermail/centos-announce/2016-January/021603.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2016:0008 vom 2016-01-07", "url": "https://lists.centos.org/pipermail/centos-announce/2016-January/021595.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-2865-1 vom 2016-01-08", "url": "http://www.ubuntu.com/usn/usn-2865-1/" }, { "category": "external", "summary": "Debian Security Advisory DSA-3436 vom 2016-01-09", "url": "https://www.debian.org/security/2016/dsa-3436" }, { "category": "external", "summary": "Debian Security Advisory DSA-3437 vom 2016-01-09", "url": "https://www.debian.org/security/2016/dsa-3437" }, { "category": "external", "summary": "Ubuntu Security Notice USN-2866-1 vom 2016-01-08", "url": "http://www.ubuntu.com/usn/usn-2866-1/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0189-1 vom 2016-01-21", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160189-1.html" }, { "category": "external", "summary": "SUSE Security Update Announcement ID SUSE-SU-2016:0636-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160636-1.html" }, { "category": "external", "summary": "NetApp Advisory NTAP-20160225-0001", "url": "https://kb.netapp.com/support/s/article/ka51A00000007A7QAI/cve-2015-7575-tls-vulnerability-in-multiple-netapp-products?language=en_US" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20160225-0001 vom 2018-03-26", "url": "https://security.netapp.com/advisory/ntap-20160225-0001/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4581 vom 2019-03-13", "url": "http://linux.oracle.com/errata/ELSA-2019-4581.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4747 vom 2019-08-16", "url": "http://linux.oracle.com/errata/ELSA-2019-4747.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9150 vom 2021-04-01", "url": "https://linux.oracle.com/errata/ELSA-2021-9150.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9272 vom 2022-04-08", "url": "https://linux.oracle.com/errata/ELSA-2022-9272.html" }, { "category": "external", "summary": "IBM Security Bulletin 690961 vom 2023-02-20", "url": "https://www.ibm.com/support/pages/node/690961" }, { "category": "external", "summary": "IBM Security Bulletin 541867 vom 2024-01-29", "url": "https://www.ibm.com/support/pages/node/541867" }, { "category": "external", "summary": "HCL Article KB0037995 vom 2024-08-30", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0037995" } ], "source_lang": "en-US", "title": "Verschiedene TLS-Implementierungen: Schwachstelle erm\u00f6glicht Umgehen von Sicherheitsvorkehrungen", "tracking": { "current_release_date": "2024-09-01T22:00:00.000+00:00", "generator": { "date": "2024-09-02T08:03:30.141+00:00", "engine": { "name": "BSI-WID", "version": "1.3.6" } }, "id": "WID-SEC-W-2023-0428", "initial_release_date": "2016-01-06T23:00:00.000+00:00", "revision_history": [ { "date": "2016-01-06T23:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2016-01-06T23:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2016-01-06T23:00:00.000+00:00", "number": "3", "summary": "Version nicht vorhanden" }, { "date": "2016-01-06T23:00:00.000+00:00", "number": "4", "summary": "Version nicht vorhanden" }, { "date": "2016-01-06T23:00:00.000+00:00", "number": "5", "summary": "Version nicht vorhanden" }, { "date": "2016-01-10T23:00:00.000+00:00", "number": "6", "summary": "New remediations available" }, { "date": "2016-01-10T23:00:00.000+00:00", "number": "7", "summary": "Version nicht vorhanden" }, { "date": "2016-01-18T23:00:00.000+00:00", "number": "8", "summary": "New remediations available" }, { "date": "2016-01-18T23:00:00.000+00:00", "number": "9", "summary": "Version nicht vorhanden" }, { "date": "2016-01-21T23:00:00.000+00:00", "number": "10", "summary": "New remediations available" }, { "date": "2016-01-21T23:00:00.000+00:00", "number": "11", "summary": "Version nicht vorhanden" }, { "date": "2016-03-03T23:00:00.000+00:00", "number": "12", "summary": "New remediations available" }, { "date": "2016-03-03T23:00:00.000+00:00", "number": "13", "summary": "Version nicht vorhanden" }, { "date": "2016-03-03T23:00:00.000+00:00", "number": "14", "summary": "Version nicht vorhanden" }, { "date": "2017-02-19T23:00:00.000+00:00", "number": "15", "summary": "New remediations available" }, { "date": "2017-02-19T23:00:00.000+00:00", "number": "16", "summary": "Version nicht vorhanden" }, { "date": "2018-03-26T22:00:00.000+00:00", "number": "17", "summary": "New remediations available" }, { "date": "2018-03-26T22:00:00.000+00:00", "number": "18", "summary": "Version nicht vorhanden" }, { "date": "2019-03-13T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-08-18T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-03-31T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-04-10T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-02-19T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-01-29T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-09-01T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von HCL aufgenommen" } ], "status": "final", "version": "25" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "HCL Notes", "product": { "name": "HCL Notes", "product_id": "T022546", "product_identification_helper": { "cpe": "cpe:/a:hcltech:notes:-" } } } ], "category": "vendor", "name": "HCL" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "8.5", "product": { "name": "IBM Content Manager 8.5", "product_id": "T009584", "product_identification_helper": { "cpe": "cpe:/a:ibm:content_manager:8.5" } } } ], "category": "product_name", "name": "Content Manager" }, { "branches": [ { "category": "product_version", "name": "840", "product": { "name": "IBM FlashSystem 840", "product_id": "T026432", "product_identification_helper": { "cpe": "cpe:/a:ibm:flashsystem:840" } } } ], "category": "product_name", "name": "FlashSystem" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c43.0.2", "product": { "name": "Mozilla Firefox \u003c43.0.2", "product_id": "T006722" } }, { "category": "product_version", "name": "43.0.2", "product": { "name": "Mozilla Firefox 43.0.2", "product_id": "T006722-fixed", "product_identification_helper": { "cpe": "cpe:/a:mozilla:firefox:43.0.2" } } } ], "category": "product_name", "name": "Firefox" }, { "branches": [ { "category": "product_version_range", "name": "\u003c38.5.2", "product": { "name": "Mozilla Firefox ESR \u003c38.5.2", "product_id": "T006723" } }, { "category": "product_version", "name": "38.5.2", "product": { "name": "Mozilla Firefox ESR 38.5.2", "product_id": "T006723-fixed", "product_identification_helper": { "cpe": "cpe:/a:mozilla:firefox_esr:38.5.2" } } } ], "category": "product_name", "name": "Firefox ESR" }, { "branches": [ { "category": "product_version_range", "name": "\u003c3.20.2", "product": { "name": "Mozilla NSS \u003c3.20.2", "product_id": "T006724" } }, { "category": "product_version", "name": "3.20.2", "product": { "name": "Mozilla NSS 3.20.2", "product_id": "T006724-fixed", "product_identification_helper": { "cpe": "cpe:/a:mozilla:network_security_services:3.20.2" } } } ], "category": "product_name", "name": "NSS" } ], "category": "vendor", "name": "Mozilla" }, { "branches": [ { "category": "product_name", "name": "NetApp Data ONTAP", "product": { "name": "NetApp Data ONTAP", "product_id": "7654", "product_identification_helper": { "cpe": "cpe:/a:netapp:data_ontap:-" } } }, { "category": "product_name", "name": "NetApp OnCommand Unified Manager", "product": { "name": "NetApp OnCommand Unified Manager", "product_id": "T009408", "product_identification_helper": { "cpe": "cpe:/a:netapp:oncommand_unified_manager:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c3.3.15", "product": { "name": "Open Source GnuTLS \u003c3.3.15", "product_id": "314645" } }, { "category": "product_version", "name": "3.3.15", "product": { "name": "Open Source GnuTLS 3.3.15", "product_id": "314645-fixed", "product_identification_helper": { "cpe": "cpe:/a:gnu:gnutls:3.3.15" } } } ], "category": "product_name", "name": "GnuTLS" }, { "branches": [ { "category": "product_version_range", "name": "\u003c1.0.1f", "product": { "name": "Open Source OpenSSL \u003c1.0.1f", "product_id": "264793" } }, { "category": "product_version", "name": "1.0.1f", "product": { "name": "Open Source OpenSSL 1.0.1f", "product_id": "264793-fixed", "product_identification_helper": { "cpe": "cpe:/a:openssl:openssl:1.0.1f" } } } ], "category": "product_name", "name": "OpenSSL" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c=8u66", "product": { "name": "Oracle Java SE \u003c=8u66", "product_id": "T006725" } }, { "category": "product_version_range", "name": "\u003c=8u66", "product": { "name": "Oracle Java SE \u003c=8u66", "product_id": "T006725-fixed" } }, { "category": "product_version_range", "name": "\u003c=7u79", "product": { "name": "Oracle Java SE \u003c=7u79", "product_id": "T006726" } }, { "category": "product_version_range", "name": "\u003c=7u79", "product": { "name": "Oracle Java SE \u003c=7u79", "product_id": "T006726-fixed" } } ], "category": "product_name", "name": "Java SE" }, { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "6", "product": { "name": "Red Hat Enterprise Linux 6", "product_id": "120737", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6" } } }, { "category": "product_version", "name": "5", "product": { "name": "Red Hat Enterprise Linux 5", "product_id": "67748", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5" } } }, { "category": "product_version", "name": "7", "product": { "name": "Red Hat Enterprise Linux 7", "product_id": "T003303", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7" } } } ], "category": "product_name", "name": "Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "T003855", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_desktop:12" } } }, { "category": "product_version", "name": "12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "T006804", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_desktop:12:sp1" } } } ], "category": "product_name", "name": "Linux Enterprise Desktop" }, { "branches": [ { "category": "product_version", "name": "12", "product": { "name": "SUSE Linux Enterprise Server 12", "product_id": "T003856", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_server:12" } } }, { "category": "product_version", "name": "12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "T006803", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_server:12:sp1" } } }, { "category": "product_version", "name": "11 SP3 LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3 LTSS", "product_id": "T007158", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_server:11:sp3:ltss" } } } ], "category": "product_name", "name": "Linux Enterprise Server" } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7575", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle (SLOOTH) in verschiedenen TLS Implementierungen. Ein entfernter, anonymer Angreifer in einer privilegierten Netzwerkposition kann diese Schwachstelle ausnutzen, um Sicherheitsvorkehrungen zu umgehen. Die Schwachstelle besteht aufgrund der M\u00f6glichkeit MD5 Signaturen erzwingen zu k\u00f6nnen, obwohl diese standardm\u00e4\u00dfig deaktiviert sind. Eine praktische Umsetzung des Angriffs gilt als unwahrscheinlich, da es dazu n\u00f6tig w\u00e4re eine b\u00f6sartige Signatur in Echtzeit zu generieren, wobei dies derzeit noch nicht m\u00f6glich ist." } ], "product_status": { "known_affected": [ "264793", "T007158", "T009408", "T006722", "T006724", "7654", "T003303", "T006723", "67748", "T006726", "T006803", "T003855", "T006725", "T003856", "T006804", "T004914", "314645", "2951", "T000126", "T022546", "120737", "1727", "T026432", "T009584" ] }, "release_date": "2016-01-06T23:00:00.000+00:00", "title": "CVE-2015-7575" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.