Rapid7 Vulnerability & Exploit Database

MFSA2015-71 SeaMonkey: NSS incorrectly permits skipping of ServerKeyExchange (CVE-2015-2721)

Back to Search

MFSA2015-71 SeaMonkey: NSS incorrectly permits skipping of ServerKeyExchange (CVE-2015-2721)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
07/05/2015
Created
07/25/2018
Added
10/22/2015
Modified
01/08/2018

Description

Mozilla Network Security Services (NSS) before 3.19, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, Thunderbird before 38.1, and other products, does not properly determine state transitions for the TLS state machine, which allows man-in-the-middle attackers to defeat cryptographic protection mechanisms by blocking messages, as demonstrated by removing a forward-secrecy property by blocking a ServerKeyExchange message, aka a "SMACK SKIP-TLS" issue.

Solution(s)

  • mozilla-seamonkey-upgrade-2_35_0

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;