[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2015-569 --- nss nss-util

ID: oval:org.secpod.oval:def:1200046Date: (C)2015-12-30   (M)2024-02-19
Class: PATCHFamily: unix




A flaw was found in the way the TLS protocol composes the Diffie-Hellman key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. Please note that this update forces the TLS/SSL client implementation in NSS to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Future updates may raise this limit to 1024 bits.

Platform:
Amazon Linux AMI
Product:
nss
nss-util
Reference:
ALAS-2015-569
CVE-2015-4000
CVE    1
CVE-2015-4000
CPE    3
cpe:/o:amazon:linux
cpe:/a:nss:network_security_services
cpe:/a:nss:nss-util

© SecPod Technologies