CVE-2015-0204

Severity

43%

Complexity

86%

Confidentiality

48%

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.

CVSS 2.0 Base Score 4.3. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).

Overview

Type

OpenSSL

First reported 10 years ago

2015-01-09 02:59:00

Last updated 6 years ago

2018-07-19 01:29:00

Affected Software

OpenSSL Project OpenSSL

OpenSSL Project OpenSSL 1.0.0a

1.0.0a

OpenSSL Project OpenSSL 1.0.0b

1.0.0b

OpenSSL Project OpenSSL 1.0.0c

1.0.0c

OpenSSL Project OpenSSL 1.0.0d

1.0.0d

OpenSSL Project OpenSSL 1.0.0e

1.0.0e

OpenSSL Project OpenSSL 1.0.0f

1.0.0f

OpenSSL Project OpenSSL 1.0.0g

1.0.0g

OpenSSL Project OpenSSL 1.0.0h

1.0.0h

OpenSSL Project OpenSSL 1.0.0i

1.0.0i

OpenSSL Project OpenSSL 1.0.0j

1.0.0j

OpenSSL Project OpenSSL 1.0.0k

1.0.0k

OpenSSL Project OpenSSL 1.0.0l

1.0.0l

OpenSSL Project OpenSSL 1.0.0m

1.0.0m

OpenSSL Project OpenSSL 1.0.0n

1.0.0n

OpenSSL OpenSSL 1.0.0o

1.0.0o

OpenSSL Project OpenSSL 1.0.1a

1.0.1a

OpenSSL Project OpenSSL 1.0.1b

1.0.1b

OpenSSL Project OpenSSL 1.0.1c

1.0.1c

OpenSSL Project OpenSSL 1.0.1d

1.0.1d

OpenSSL Project OpenSSL 1.0.1e

1.0.1e

OpenSSL Project OpenSSL 1.0.1f

1.0.1f

OpenSSL Project OpenSSL 1.0.1g

1.0.1g

OpenSSL Project OpenSSL 1.0.1h

1.0.1h

OpenSSL Project OpenSSL 1.0.1i

1.0.1i

OpenSSL Project OpenSSL 1.0.1j

1.0.1j

References

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679

APPLE-SA-2015-04-08-2

openSUSE-SU-2015:0130

SUSE-SU-2015:0578

SUSE-SU-2015:0946

SUSE-SU-2015:1085

SUSE-SU-2015:1086

SUSE-SU-2015:1138

SUSE-SU-2015:1161

SUSE-SU-2015:2166

SUSE-SU-2015:2168

SUSE-SU-2015:2182

SUSE-SU-2015:2192

SUSE-SU-2015:2216

SUSE-SU-2016:0113

openSUSE-SU-2016:0640

HPSBUX03162

HPSBUX03244

HPSBGN03299

HPSBHF03289

HPSBOV03318

HPSBUX03334

HPSBMU03380

HPSBMU03345

HPSBMU03409

HPSBMU03396

HPSBMU03413

HPSBMU03397

RHSA-2015:0066

RHSA-2015:0800

RHSA-2015:0849

RHSA-2016:1650

http://support.novell.com/security/cve/CVE-2015-0204.html

20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products

DSA-3125

MDVSA-2015:019

MDVSA-2015:062

MDVSA-2015:063

http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html

http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html

http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html

http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html

http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html

http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html

http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html

71936

91787

1033378

http://www-01.ibm.com/support/docview.wss?uid=swg21883640

http://www-304.ibm.com/support/docview.wss?uid=swg21960769

https://bto.bluecoat.com/security-advisory/sa88

https://bto.bluecoat.com/security-advisory/sa91

openssl-cve20150204-weak-security(99707)

https://freakattack.com/

Vendor Advisory

https://github.com/openssl/openssl/commit/ce325c60c74b0fa784f5872404b722e120e5cab0

https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241

https://kc.mcafee.com/corporate/index?page=content&id=SB10102

https://kc.mcafee.com/corporate/index?page=content&id=SB10108

https://kc.mcafee.com/corporate/index?page=content&id=SB10110

GLSA-201503-11

https://support.apple.com/HT204659

https://support.citrix.com/article/CTX216642

https://www.openssl.org/news/secadv_20150108.txt

Vendor Advisory

https://www.openssl.org/news/secadv_20150319.txt

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.