Bug 1219223 (CVE-2015-0138) - CVE-2015-0138 IBM JDK: ephemeral RSA keys accepted for non-export SSL/TLS cipher suites (FREAK)
Summary: CVE-2015-0138 IBM JDK: ephemeral RSA keys accepted for non-export SSL/TLS cip...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2015-0138
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1209063
TreeView+ depends on / blocked
 
Reported: 2015-05-06 21:00 UTC by Tomas Hoger
Modified: 2019-09-29 13:32 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-05-20 20:39:27 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:1006 0 normal SHIPPED_LIVE Critical: java-1.6.0-ibm security update 2015-05-13 17:34:08 UTC
Red Hat Product Errata RHSA-2015:1007 0 normal SHIPPED_LIVE Critical: java-1.7.0-ibm security update 2015-05-13 17:33:04 UTC
Red Hat Product Errata RHSA-2015:1020 0 normal SHIPPED_LIVE Critical: java-1.7.1-ibm security update 2015-05-20 23:05:51 UTC
Red Hat Product Errata RHSA-2015:1021 0 normal SHIPPED_LIVE Important: java-1.5.0-ibm security update 2015-05-20 22:36:22 UTC
Red Hat Product Errata RHSA-2015:1091 0 normal SHIPPED_LIVE Low: Red Hat Satellite IBM Java Runtime security update 2015-06-11 17:21:29 UTC

Description Tomas Hoger 2015-05-06 21:00:20 UTC
IBM JDK versions 5.0 SR16-FP10, 6 SR16-FP4, 6R1 SR8-FP4, 7 SR9, 7R1 SR3 and 8 SR1 correct an issue known as "FREAK" (Factoring RSA Export Keys).  An SSL/TLS client using IBM JDK's JSSE can accept ephemeral RSA keys even when using non-export cipher suites.  A MITM attacker could possibly use this flaw to impersonate server which enables export cipher suites.  This issue is similar to CVE-2015-0204 (bug 1180184) which affected OpenSSL.

Description of the flaw in the IBM security bulletin:

A vulnerability in various IBM SSL/TLS implementations could allow a remote attacker to downgrade the security of certain SSL/TLS connections. An IBM SSL/TLS client implementation could accept the use of an RSA temporary key in a non-export RSA key exchange ciphersuite. This could allow a remote attacker using man-in-the-middle techniques to facilitate brute-force decryption of TLS/SSL traffic between vulnerable clients and servers. This vulnerability is also known as the FREAK attack.

References:

http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_May_2015
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
https://www.smacktls.com/#freak

Comment 1 Tomas Hoger 2015-05-07 12:32:40 UTC
In addition to fixing the bug that causes client to accept ephemeral RSA keys for non-export cipher suites, these updates also disable export cipher suites by default in IBM JDK 5.0 and 6.  They were previously disabled in IBM JDK 7.

Comment 2 errata-xmlrpc 2015-05-13 13:34:05 UTC
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 5

Via RHSA-2015:1007 https://rhn.redhat.com/errata/RHSA-2015-1007.html

Comment 3 errata-xmlrpc 2015-05-13 13:36:00 UTC
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 6
  Supplementary for Red Hat Enterprise Linux 5

Via RHSA-2015:1006 https://rhn.redhat.com/errata/RHSA-2015-1006.html

Comment 4 errata-xmlrpc 2015-05-20 18:37:11 UTC
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 5
  Supplementary for Red Hat Enterprise Linux 6

Via RHSA-2015:1021 https://rhn.redhat.com/errata/RHSA-2015-1021.html

Comment 5 errata-xmlrpc 2015-05-20 19:06:46 UTC
This issue has been addressed in the following products:

  Supplementary for Red Hat Enterprise Linux 6
  Supplementary for Red Hat Enterprise Linux 7

Via RHSA-2015:1020 https://rhn.redhat.com/errata/RHSA-2015-1020.html

Comment 6 errata-xmlrpc 2015-06-11 13:22:17 UTC
This issue has been addressed in the following products:

  Red Hat Satellite Server v 5.6
  Red Hat Satellite Server v 5.7

Via RHSA-2015:1091 https://rhn.redhat.com/errata/RHSA-2015-1091.html


Note You need to log in before you can comment on or make changes to this bug.