Rapid7 Vulnerability & Exploit Database

Amazon Linux AMI: CVE-2015-7575: Security patch for openssl ((Multiple Advisories))

Back to Search

Amazon Linux AMI: CVE-2015-7575: Security patch for openssl ((Multiple Advisories))

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
01/08/2016
Created
05/08/2019
Added
04/20/2016
Modified
05/03/2019

Description

Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.

Solution(s)

  • amazon-linux-upgrade-gnutls
  • amazon-linux-upgrade-java-1-7-0-openjdk
  • amazon-linux-upgrade-java-1-8-0-openjdk
  • amazon-linux-upgrade-nss
  • amazon-linux-upgrade-openssl

References

  • amazon-linux-upgrade-gnutls
  • amazon-linux-upgrade-java-1-7-0-openjdk
  • amazon-linux-upgrade-java-1-8-0-openjdk
  • amazon-linux-upgrade-nss
  • amazon-linux-upgrade-openssl

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;