Bug 1301846 (CVE-2015-3197)
Summary: | CVE-2015-3197 OpenSSL: SSLv2 doesn't block disabled ciphers | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Huzaifa S. Sidhpurwala <huzaifas> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | alonbl, anemec, bmcclain, chazlett, dandread, dblechte, erik-fedora, fdeutsch, fnasser, hkario, huwang, jaeshin, jgreguske, ktietz, lgao, lsurette, marcandre.lureau, mgoldboi, michal.skrivanek, moshiro, myarboro, pdwyer, pstehlik, redhat-bugzilla, rjones, security-response-team, slawomir, slong, srevivo, tmraz, twalsh, ycui, ykaul, yozone |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | openssl 1.0.1r, openssl 1.0.2f | Doc Type: | Bug Fix |
Doc Text: |
A flaw was found in the way malicious SSLv2 clients could negotiate SSLv2 ciphers that were disabled on the server. This could result in weak SSLv2 ciphers being used for SSLv2 connections, making them vulnerable to man-in-the-middle attacks.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-04-16 14:11:57 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1301848, 1301849, 1301850, 1301851, 1301852, 1302767, 1302768, 1302769, 1312901, 1312902, 1312903, 1312904, 1313535, 1313595, 1313598, 1313621 | ||
Bug Blocks: | 1301847 |
Description
Huzaifa S. Sidhpurwala
2016-01-26 07:32:55 UTC
Statement: This security flaw can only be exploited when a malicious client negotiates SSLv2 ciphers and completes a SSLv2 handshake. This flaw cannot be actively exploited by a Man-In-The-Middle attacker. All versions of OpenSSL shipped with Red Hat Enterprise Linux enable SSLv2 protocol, but disable SSLv2 ciphers by default (in Red Hat Enterprise Linux 6 and later), therefore are vulnerable to this flaw. Red Hat Product Security has rated this issue as having Low security impact, a future update may address this flaw. SSLv2 suffers from a number of security flaws allowing attackers to capture and alter information passed between a client and the server. Therefore we strongly recommend that SSLv2 should be disabled on all the SSL/TLS servers. Public via: External References: https://www.openssl.org/news/secadv/20160128.txt Created openssl101e tracking bugs for this issue: Affects: epel-5 [bug 1302769] Created openssl tracking bugs for this issue: Affects: fedora-all [bug 1302767] Created mingw-openssl tracking bugs for this issue: Affects: fedora-all [bug 1302768] openssl-1.0.2f-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report. Upstream commit: https://git.openssl.org/?p=openssl.git;a=commitdiff;h=4040a7fd104b412bd446338c6c28a62eb7d8e852 This issue has been addressed in the following products: Red Hat Enterprise Linux 4 Extended Lifecycle Support Via RHSA-2016:0306 https://rhn.redhat.com/errata/RHSA-2016-0306.html This issue has been addressed in the following products: Red Hat Enterprise Linux 5.6 Long Life Red Hat Enterprise Linux 5.9 Long Life Via RHSA-2016:0304 https://rhn.redhat.com/errata/RHSA-2016-0304.html This issue has been addressed in the following products: Red Hat Enterprise Linux 6.2 Advanced Update Support Red Hat Enterprise Linux 6.5 Advanced Update Support Red Hat Enterprise Linux 6.4 Advanced Update Support Via RHSA-2016:0303 https://rhn.redhat.com/errata/RHSA-2016-0303.html This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Via RHSA-2016:0302 https://rhn.redhat.com/errata/RHSA-2016-0302.html This issue has been addressed in the following products: Red Hat Enterprise Linux 7.1 Extended Update Support Red Hat Enterprise Linux 6.6 Extended Update Support Via RHSA-2016:0305 https://rhn.redhat.com/errata/RHSA-2016-0305.html This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Via RHSA-2016:0301 https://rhn.redhat.com/errata/RHSA-2016-0301.html This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Via RHSA-2016:0372 https://rhn.redhat.com/errata/RHSA-2016-0372.html This issue has been addressed in the following products: RHEV-H and Agents for RHEL-6 RHEV-H and Agents for RHEL-7 Via RHSA-2016:0379 https://rhn.redhat.com/errata/RHSA-2016-0379.html This issue has been addressed in the following products: JBoss Web Server 2.1.0 Via RHSA-2016:0445 https://rhn.redhat.com/errata/RHSA-2016-0445.html This issue has been addressed in the following products: JBoss Web Server 3.0.2 Via RHSA-2016:0446 https://rhn.redhat.com/errata/RHSA-2016-0446.html openssl101e-1.0.1e-7.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in the following products: JBoss Enterprise Application Platform 6.4.6 Via RHSA-2016:0490 https://rhn.redhat.com/errata/RHSA-2016-0490.html |