Use of a Broken or Risky Cryptographic Algorithm Affecting openssl package, versions <1:1.0.1e-42.el7_1.6
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL7-OPENSSL-4549617
- published 26 Jul 2021
- disclosed 20 May 2015
Introduced: 20 May 2015
CVE-2015-4000 Open this link in a new tabHow to fix?
Upgrade RHEL:7
openssl
to version 1:1.0.1e-42.el7_1.6 or higher.
This issue was patched in RHSA-2015:1072
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by RHEL
.
See How to fix?
for RHEL:7
relevant fixed versions and status.
The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
References
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://www.securityfocus.com/bid/74733
- http://www.securityfocus.com/bid/91787
- http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc
- http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery
- http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04876402
- http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04949778
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10681
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
- https://bto.bluecoat.com/security-advisory/sa98
- https://bugzilla.mozilla.org/show_bug.cgi?id=1138554
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.1_release_notes
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04918839
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923929
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04740527
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04953655
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128722
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193083
- https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- https://openssl.org/news/secadv/20150611.txt
- https://puppet.com/security/cve/CVE-2015-4000
- https://security.netapp.com/advisory/ntap-20150619-0001/
- https://support.citrix.com/article/CTX216642
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03831en_us
- http://support.apple.com/kb/HT204941
- http://support.apple.com/kb/HT204942
- http://support.citrix.com/article/CTX201114
- https://www-304.ibm.com/support/docview.wss?uid=swg21959745
- https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098403
- https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/
- https://www.openssl.org/news/secadv_20150611.txt
- https://www.suse.com/security/cve/CVE-2015-4000.html
- http://www-01.ibm.com/support/docview.wss?uid=swg21959111
- http://www-01.ibm.com/support/docview.wss?uid=swg21959195
- http://www-01.ibm.com/support/docview.wss?uid=swg21959325
- http://www-01.ibm.com/support/docview.wss?uid=swg21959453
- http://www-01.ibm.com/support/docview.wss?uid=swg21959481
- http://www-01.ibm.com/support/docview.wss?uid=swg21959517
- http://www-01.ibm.com/support/docview.wss?uid=swg21959530
- http://www-01.ibm.com/support/docview.wss?uid=swg21959539
- http://www-01.ibm.com/support/docview.wss?uid=swg21959636
- http://www-01.ibm.com/support/docview.wss?uid=swg21959812
- http://www-01.ibm.com/support/docview.wss?uid=swg21960191
- http://www-01.ibm.com/support/docview.wss?uid=swg21961717
- http://www-01.ibm.com/support/docview.wss?uid=swg21962455
- http://www-01.ibm.com/support/docview.wss?uid=swg21962739
- http://www-304.ibm.com/support/docview.wss?uid=swg21958984
- http://www-304.ibm.com/support/docview.wss?uid=swg21959132
- http://www-304.ibm.com/support/docview.wss?uid=swg21960041
- http://www-304.ibm.com/support/docview.wss?uid=swg21960194
- http://www-304.ibm.com/support/docview.wss?uid=swg21960380
- http://www-304.ibm.com/support/docview.wss?uid=swg21960418
- http://www-304.ibm.com/support/docview.wss?uid=swg21962816
- http://www-304.ibm.com/support/docview.wss?uid=swg21967893
- http://www.fortiguard.com/advisory/2015-05-20-logjam-attack
- http://www.mozilla.org/security/announce/2015/mfsa2015-70.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.solarwinds.com/documentation/storage/storagemanager/docs/ReleaseNotes/releaseNotes.htm
- https://access.redhat.com/security/cve/CVE-2015-4000
- http://www.debian.org/security/2015/dsa-3287
- http://www.debian.org/security/2015/dsa-3300
- http://www.debian.org/security/2015/dsa-3316
- http://www.debian.org/security/2015/dsa-3324
- http://www.debian.org/security/2015/dsa-3339
- http://www.debian.org/security/2016/dsa-3688
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159314.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159351.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160117.html
- https://security.gentoo.org/glsa/201506-02
- https://security.gentoo.org/glsa/201512-10
- https://security.gentoo.org/glsa/201603-11
- https://security.gentoo.org/glsa/201701-46
- http://marc.info/?l=bugtraq&m=143506486712441&w=2
- http://marc.info/?l=bugtraq&m=143557934009303&w=2
- http://marc.info/?l=bugtraq&m=143558092609708&w=2
- http://marc.info/?l=bugtraq&m=143628304012255&w=2
- http://marc.info/?l=bugtraq&m=143637549705650&w=2
- http://marc.info/?l=bugtraq&m=143655800220052&w=2
- http://marc.info/?l=bugtraq&m=143880121627664&w=2
- http://marc.info/?l=bugtraq&m=144043644216842&w=2
- http://marc.info/?l=bugtraq&m=144050121701297&w=2
- http://marc.info/?l=bugtraq&m=144060576831314&w=2
- http://marc.info/?l=bugtraq&m=144060606031437&w=2
- http://marc.info/?l=bugtraq&m=144061542602287&w=2
- http://marc.info/?l=bugtraq&m=144069189622016&w=2
- http://marc.info/?l=bugtraq&m=144102017024820&w=2
- http://marc.info/?l=bugtraq&m=144104533800819&w=2
- http://marc.info/?l=bugtraq&m=144493176821532&w=2
- http://marc.info/?l=bugtraq&m=145409266329539&w=2
- https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04718196
- https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/
- https://weakdh.org/
- https://weakdh.org/imperfect-forward-secrecy.pdf
- https://www.oracle.com/security-alerts/cpujan2021.html
- http://openwall.com/lists/oss-security/2015/05/20/8
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc
- http://rhn.redhat.com/errata/RHSA-2015-1072.html
- http://rhn.redhat.com/errata/RHSA-2015-1185.html
- http://rhn.redhat.com/errata/RHSA-2015-1197.html
- http://rhn.redhat.com/errata/RHSA-2015-1228.html
- http://rhn.redhat.com/errata/RHSA-2015-1229.html
- http://rhn.redhat.com/errata/RHSA-2015-1230.html
- http://rhn.redhat.com/errata/RHSA-2015-1241.html
- http://rhn.redhat.com/errata/RHSA-2015-1242.html
- http://rhn.redhat.com/errata/RHSA-2015-1243.html
- http://rhn.redhat.com/errata/RHSA-2015-1485.html
- http://rhn.redhat.com/errata/RHSA-2015-1486.html
- http://rhn.redhat.com/errata/RHSA-2015-1488.html
- http://rhn.redhat.com/errata/RHSA-2015-1526.html
- http://rhn.redhat.com/errata/RHSA-2015-1544.html
- http://rhn.redhat.com/errata/RHSA-2015-1604.html
- http://rhn.redhat.com/errata/RHSA-2016-1624.html
- http://rhn.redhat.com/errata/RHSA-2016-2056.html
- https://access.redhat.com/errata/RHSA-2015:1072
- http://www.securitytracker.com/id/1032474
- http://www.securitytracker.com/id/1032475
- http://www.securitytracker.com/id/1032476
- http://www.securitytracker.com/id/1032637
- http://www.securitytracker.com/id/1032645
- http://www.securitytracker.com/id/1032647
- http://www.securitytracker.com/id/1032648
- http://www.securitytracker.com/id/1032649
- http://www.securitytracker.com/id/1032650
- http://www.securitytracker.com/id/1032651
- http://www.securitytracker.com/id/1032652
- http://www.securitytracker.com/id/1032653
- http://www.securitytracker.com/id/1032654
- http://www.securitytracker.com/id/1032655
- http://www.securitytracker.com/id/1032656
- http://www.securitytracker.com/id/1032688
- http://www.securitytracker.com/id/1032699
- http://www.securitytracker.com/id/1032702
- http://www.securitytracker.com/id/1032727
- http://www.securitytracker.com/id/1032759
- http://www.securitytracker.com/id/1032777
- http://www.securitytracker.com/id/1032778
- http://www.securitytracker.com/id/1032783
- http://www.securitytracker.com/id/1032784
- http://www.securitytracker.com/id/1032856
- http://www.securitytracker.com/id/1032864
- http://www.securitytracker.com/id/1032865
- http://www.securitytracker.com/id/1032871
- http://www.securitytracker.com/id/1032884
- http://www.securitytracker.com/id/1032910
- http://www.securitytracker.com/id/1032932
- http://www.securitytracker.com/id/1032960
- http://www.securitytracker.com/id/1033019
- http://www.securitytracker.com/id/1033064
- http://www.securitytracker.com/id/1033065
- http://www.securitytracker.com/id/1033067
- http://www.securitytracker.com/id/1033208
- http://www.securitytracker.com/id/1033209
- http://www.securitytracker.com/id/1033210
- http://www.securitytracker.com/id/1033222
- http://www.securitytracker.com/id/1033341
- http://www.securitytracker.com/id/1033385
- http://www.securitytracker.com/id/1033416
- http://www.securitytracker.com/id/1033430
- http://www.securitytracker.com/id/1033433
- http://www.securitytracker.com/id/1033513
- http://www.securitytracker.com/id/1033760
- http://www.securitytracker.com/id/1033891
- http://www.securitytracker.com/id/1033991
- http://www.securitytracker.com/id/1034087
- http://www.securitytracker.com/id/1034728
- http://www.securitytracker.com/id/1034884
- http://www.securitytracker.com/id/1036218
- http://www.securitytracker.com/id/1040630
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00016.html
- http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00094.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00097.html
- http://www.ubuntu.com/usn/USN-2656-1
- http://www.ubuntu.com/usn/USN-2656-2
- http://www.ubuntu.com/usn/USN-2673-1
- http://www.ubuntu.com/usn/USN-2696-1
- http://www.ubuntu.com/usn/USN-2706-1
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf