vulnerability

CentOS: (CVE-2015-7575) (Multiple Advisories): java-1.7.0-openjdk

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Jan 8, 2016
Added
Jul 6, 2016
Modified
May 7, 2019

Description

Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.

Solution(s)

centos-upgrade-gnutlscentos-upgrade-gnutls-ccentos-upgrade-gnutls-danecentos-upgrade-gnutls-develcentos-upgrade-gnutls-guilecentos-upgrade-gnutls-utilscentos-upgrade-java-1-7-0-openjdkcentos-upgrade-java-1-7-0-openjdk-accessibilitycentos-upgrade-java-1-7-0-openjdk-democentos-upgrade-java-1-7-0-openjdk-develcentos-upgrade-java-1-7-0-openjdk-headlesscentos-upgrade-java-1-7-0-openjdk-javadoccentos-upgrade-java-1-7-0-openjdk-srccentos-upgrade-java-1-8-0-openjdkcentos-upgrade-java-1-8-0-openjdk-accessibilitycentos-upgrade-java-1-8-0-openjdk-accessibility-debugcentos-upgrade-java-1-8-0-openjdk-debugcentos-upgrade-java-1-8-0-openjdk-democentos-upgrade-java-1-8-0-openjdk-demo-debugcentos-upgrade-java-1-8-0-openjdk-develcentos-upgrade-java-1-8-0-openjdk-devel-debugcentos-upgrade-java-1-8-0-openjdk-headlesscentos-upgrade-java-1-8-0-openjdk-headless-debugcentos-upgrade-java-1-8-0-openjdk-javadoccentos-upgrade-java-1-8-0-openjdk-javadoc-debugcentos-upgrade-java-1-8-0-openjdk-srccentos-upgrade-java-1-8-0-openjdk-src-debugcentos-upgrade-nsscentos-upgrade-nss-develcentos-upgrade-nss-pkcs11-develcentos-upgrade-nss-sysinitcentos-upgrade-nss-toolscentos-upgrade-opensslcentos-upgrade-openssl-develcentos-upgrade-openssl-libscentos-upgrade-openssl-perlcentos-upgrade-openssl-static
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.