[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3436-1 openssl -- openssl

ID: oval:org.secpod.oval:def:602334Date: (C)2016-01-27   (M)2024-01-29
Class: PATCHFamily: unix




Karthikeyan Bhargavan and Gaetan Leurent at INRIA discovered a flaw in the TLS 1.2 protocol which could allow the MD5 hash function to be used for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker could exploit this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client. More information can be found at https://www.mitls.org/pages/attacks/SLOTH

Platform:
Debian 7.x
Product:
openssl
Reference:
DSA-3436-1
CVE-2015-7575
CVE    1
CVE-2015-7575
CPE    2
cpe:/o:debian:debian_linux:7.x
cpe:/a:openssl:openssl

© SecPod Technologies