Select your cookie preferences

We use cookies and similar tools to enhance your experience, provide our services, deliver relevant advertising, and make improvements. Approved third parties also use these tools to help us deliver advertising and provide certain site features.

CVE-2015-7575

Public on 2016-01-09
Modified on 2016-04-28
Description

A flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client.

Severity
Medium
See what this means
CVSS v3 Base Score
5.8
See breakdown
Continue reading

Affected Packages

Platform Package Release Date Advisory
Amazon Linux 1 gnutls 2016-02-09 13:30 ALAS-2016-651
Amazon Linux 1 java-1.7.0-openjdk 2016-02-09 13:30 ALAS-2016-643
Amazon Linux 1 java-1.8.0-openjdk 2016-02-09 13:30 ALAS-2016-647
Amazon Linux 1 nss 2016-02-09 13:30 ALAS-2016-645
Amazon Linux 1 openssl 2016-03-10 16:30 ALAS-2016-661

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv2 5.8 AV:N/AC:M/Au:N/C:P/I:P/A:N
NVD CVSSv2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N
NVD CVSSv3 5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N