CVE-2015-4000

Scores

EPSS

0.939high93.9%
0%20%40%60%80%100%

Percentile: 93.9%

CVSS

3.7low3.x
0246810

CVSS Score: 3.7/10

All CVSS Scores

CVSS 3.x
3.7

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

CVSS 2.0
4.3

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Description

The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the “Logjam” issue.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

anchore_overridesdebiannvdredhatubuntu

CWEs

CWE-310CWE-327

Related Vulnerabilities

Recommendations

Source: nvd

All OpenSSL 1.0.1 users should upgrade to the latest version:
# emerge –sync
# emerge –ask –oneshot –verbose “>=dev-libs/openssl-1.0.1o”

All OpenSSL 0.9.8 users should upgrade to the latest version:
# emerge –sync
# emerge –ask –oneshot –verbose “>=dev-libs/openssl-0.9.8z_p7”

URL: https://security.gentoo.org/glsa/201506-02

Source: nvd

Before applying this update, make sure all previously released erratarelevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258

URL: http://rhn.redhat.com/errata/RHSA-2015-1197.html

Source: nvd

Before applying this update, make sure all previously released erratarelevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258

URL: http://rhn.redhat.com/errata/RHSA-2015-1185.html

Source: nvd

Before applying this update, make sure all previously released erratarelevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258

URL: http://rhn.redhat.com/errata/RHSA-2015-1072.html

Vulnerable Software (186)

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",          "versionEndIncluding": "8.3"        }      ],      "negate": fals...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",          "versionEndIncluding": "10.10.3"        }      ],      "negate": f...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",          "versionEndExcluding": "8.0.7"        }      ],      "negate": false...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*"        },        {          "cpe23uri": "cpe:2.3:o:canonical:ubun...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"        },        {          "cpe23uri": "cpe:2.3:o:debian:debian_linux...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",          "versionEndExcluding": "45.0.2454.85"        }      ],      "negate...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:hp:hp-ux:b.11.31:*:*:*:*:*:*:*"        }      ],      "negate": false,      "operator": "OR"    }  ],  "o...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:ibm:content_manager:8.5:*:*:*:*:enterprise:*:*"        }      ],      "negate": false,      "operator": "OR"...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:microsoft:internet_explorer:0:*:*:*:*:*:*:*"        }      ],      "negate": false,      "operator": "OR"  ...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",          "versionEndExcluding": "39"        }      ],      "negate": false...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",          "versionEndExcluding": "38.1.0"        },        {          "cpe2...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",          "versionEndExcluding": "31.8"        }      ],      "negate":...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:mozilla:firefox_os:2.2:*:*:*:*:*:*:*"        }      ],      "negate": false,      "operator": "OR"    }  ]...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:mozilla:network_security_services:3.19:*:*:*:*:*:*:*"        }      ],      "negate": false,      "operator"...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:mozilla:seamonkey:2.35:*:*:*:*:*:*:*"        }      ],      "negate": false,      "operator": "OR"    }  ]...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:mozilla:thunderbird:31.8:*:*:*:*:*:*:*"        },        {          "cpe23uri": "cpe:2.3:a:mozilla:thunderbir...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",          "versionEndIncluding": "1.0.1m",          "versionStartIncluding": ...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",          "versionEndIncluding": "1.0.1m"        }      ],      "negate": f...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*",          "versionEndExcluding": "32.0.1899.0"        }      ],      "n...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:oracle:jdk:1.6.0-update95:*:*:*:*:*:*:*"        },        {          "cpe23uri": "cpe:2.3:a:oracle:jdk:1.7.0-...

Source: anchore_overrides