CVE-2015-4000

The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.

Published : 2015-05-21 00:59 Updated : 2019-10-09 23:14

4.3
CVSS Score More info
Score 4.3 / 10
4.3
Vendor Product Version URI
Openssl Openssl 1.0.1 cpe:/a:openssl:openssl:1.0.1
Openssl Openssl 1.0.1 cpe:/a:openssl:openssl:1.0.1:beta1
Openssl Openssl 1.0.1 cpe:/a:openssl:openssl:1.0.1:beta2
Openssl Openssl 1.0.1 cpe:/a:openssl:openssl:1.0.1:beta3
Openssl Openssl 1.0.1a cpe:/a:openssl:openssl:1.0.1a
Openssl Openssl 1.0.1b cpe:/a:openssl:openssl:1.0.1b
Openssl Openssl 1.0.1c cpe:/a:openssl:openssl:1.0.1c
Openssl Openssl 1.0.1d cpe:/a:openssl:openssl:1.0.1d
Openssl Openssl 1.0.1e cpe:/a:openssl:openssl:1.0.1e
Openssl Openssl 1.0.1f cpe:/a:openssl:openssl:1.0.1f
Openssl Openssl 1.0.1g cpe:/a:openssl:openssl:1.0.1g
Openssl Openssl 1.0.1h cpe:/a:openssl:openssl:1.0.1h
Openssl Openssl 1.0.1i cpe:/a:openssl:openssl:1.0.1i
Openssl Openssl 1.0.1j cpe:/a:openssl:openssl:1.0.1j
Openssl Openssl 1.0.1k cpe:/a:openssl:openssl:1.0.1k
Openssl Openssl 1.0.1l cpe:/a:openssl:openssl:1.0.1l
Openssl Openssl 1.0.2 cpe:/a:openssl:openssl:1.0.2
Openssl Openssl 1.0.2 cpe:/a:openssl:openssl:1.0.2:beta1
Openssl Openssl 1.0.2 cpe:/a:openssl:openssl:1.0.2:beta2
Openssl Openssl 1.0.2 cpe:/a:openssl:openssl:1.0.2:beta3
Openssl Openssl 1.0.2a cpe:/a:openssl:openssl:1.0.2a
Mozilla Firefox Esr 38.1.0 cpe:/a:mozilla:firefox_esr:38.1.0
Ibm Content Manager 8.5 cpe:/a:ibm:content_manager:8.5::~~~enterprise~~
Debian Debian Linux 8.0 cpe:/o:debian:debian_linux:8.0
Oracle Jdk 1.7.0 cpe:/a:oracle:jdk:1.7.0:update_75
Apple Mac Os X 10.10.3 cpe:/o:apple:mac_os_x:10.10.3
Mozilla Seamonkey 2.35 cpe:/a:mozilla:seamonkey:2.35
Mozilla Firefox 39.0 cpe:/a:mozilla:firefox:39.0
Oracle Jdk 1.8.0 cpe:/a:oracle:jdk:1.8.0:update_33
Apple Safari cpe:/a:apple:safari
Mozilla Firefox Os 2.2 cpe:/o:mozilla:firefox_os:2.2
Oracle Jrockit r28.3.6 cpe:/a:oracle:jrockit:r28.3.6
Debian Debian Linux 7.0 cpe:/o:debian:debian_linux:7.0
Mozilla Network Security Services 3.19 cpe:/a:mozilla:network_security_services:3.19
Canonical Ubuntu Linux 14.10 cpe:/o:canonical:ubuntu_linux:14.10
Oracle Jre 1.6.0 cpe:/a:oracle:jre:1.6.0:update_95
Oracle Sparc-opl Service Processor 1121 cpe:/a:oracle:sparc-opl_service_processor:1121
Microsoft Ie cpe:/a:microsoft:ie
Hp Hp-ux b.11.31 cpe:/o:hp:hp-ux:b.11.31
Suse Linux Enterprise Software Development Kit 12 cpe:/o:suse:linux_enterprise_software_development_kit:12
Canonical Ubuntu Linux 15.04 cpe:/o:canonical:ubuntu_linux:15.04
Oracle Jre 1.7.0 cpe:/a:oracle:jre:1.7.0:update_75
Oracle Jre 1.8.0 cpe:/a:oracle:jre:1.8.0:update_33
Openssl Openssl 1.0.1m cpe:/a:openssl:openssl:1.0.1m
Mozilla Firefox Esr 31.8 cpe:/a:mozilla:firefox_esr:31.8
Canonical Ubuntu Linux 12.04 cpe:/o:canonical:ubuntu_linux:12.04::~~lts~~~
Oracle Jdk 1.8.0 cpe:/a:oracle:jdk:1.8.0:update_45
Mozilla Thunderbird 38.1 cpe:/a:mozilla:thunderbird:38.1
Opera Opera Browser - cpe:/a:opera:opera_browser:-
Canonical Ubuntu Linux 14.04 cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~
Apple Iphone Os 8.3 cpe:/o:apple:iphone_os:8.3
Oracle Jdk 1.7.0 cpe:/a:oracle:jdk:1.7.0:update_80
Suse Linux Enterprise Desktop 12 cpe:/o:suse:linux_enterprise_desktop:12
Oracle Jre 1.8.0 cpe:/a:oracle:jre:1.8.0:update_45
Google Chrome - cpe:/a:google:chrome:-
Oracle Jre 1.7.0 cpe:/a:oracle:jre:1.7.0:update_80
Oracle Jdk 1.6.0 cpe:/a:oracle:jdk:1.6.0:update_95
Suse Linux Enterprise Server 11.0 cpe:/o:suse:linux_enterprise_server:11.0:sp4
Mozilla Firefox cpe:/a:mozilla:firefox
Mozilla Thunderbird 31.8 cpe:/a:mozilla:thunderbird:31.8
Suse Suse Linux Enterprise Server 12 cpe:/o:suse:suse_linux_enterprise_server:12
  1. Ibm (1) Search CVE
    1. Content Manager (1) Search CVE
      1. 8.5
  2. Mozilla (6) Search CVE
    1. Firefox Esr (2) Search CVE
      1. 38.1.0
      2. 31.8
    2. Seamonkey (1) Search CVE
      1. 2.35
    3. Network Security Services (1) Search CVE
      1. 3.19
    4. Firefox Os (1) Search CVE
      1. 2.2
    5. Firefox (2) Search CVE
      1. 39.0
    6. Thunderbird (2) Search CVE
      1. 38.1
      2. 31.8
  3. Google (1) Search CVE
    1. Chrome (1) Search CVE
      1. -
  4. Apple (3) Search CVE
    1. Iphone Os (1) Search CVE
      1. 8.3
    2. Mac Os X (1) Search CVE
      1. 10.10.3
    3. Safari (1) Search CVE
  5. Suse (4) Search CVE
    1. Suse Linux Enterprise Server (1) Search CVE
      1. 12
    2. Linux Enterprise Software Development Kit (1) Search CVE
      1. 12
    3. Linux Enterprise Server (1) Search CVE
      1. 11.0
    4. Linux Enterprise Desktop (1) Search CVE
      1. 12
  6. Oracle (4) Search CVE
    1. Jdk (3) Search CVE
      1. 1.7.0
      2. 1.8.0
      3. 1.6.0
    2. Jrockit (1) Search CVE
      1. R28.3.6
    3. Sparc-opl Service Processor (1) Search CVE
      1. 1121
    4. Jre (3) Search CVE
      1. 1.6.0
      2. 1.7.0
      3. 1.8.0
  7. Canonical (1) Search CVE
    1. Ubuntu Linux (4) Search CVE
      1. 14.10
      2. 15.04
      3. 12.04
      4. 14.04
  8. Opera (1) Search CVE
    1. Opera Browser (1) Search CVE
      1. -
  9. Microsoft (1) Search CVE
    1. Ie (1) Search CVE
  10. Openssl (1) Search CVE
    1. Openssl (16) Search CVE
      1. 1.0.1
      2. 1.0.1a
      3. 1.0.1b
      4. 1.0.1c
      5. 1.0.1d
      6. 1.0.1e
      7. 1.0.1f
      8. 1.0.1g
      9. 1.0.1h
      10. 1.0.1i
      11. 1.0.1j
      12. 1.0.1k
      13. 1.0.1l
      14. 1.0.2
      15. 1.0.2a
      16. 1.0.1m
  11. Hp (1) Search CVE
    1. Hp-ux (1) Search CVE
      1. B.11.31
  12. Debian (1) Search CVE
    1. Debian Linux (2) Search CVE
      1. 8.0
      2. 7.0

CWE

ID Name Description Links
CWE-310 Cryptographic Issues Weaknesses in this category are related to the use of cryptography. CVE

References

Source Link
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html
NETBSD http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html
CONFIRM http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery
CONFIRM http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html
FEDORA http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160117.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
FEDORA http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159351.html
APPLE http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html
FEDORA http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159314.html
CONFIRM http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html
CONFIRM http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04876402
APPLE http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
SUSE http://lists.opensuse.org/opensuse-updates/2016-02/msg00097.html
CONFIRM http://support.apple.com/kb/HT204941
HP http://marc.info/?l=bugtraq&m=145409266329539&w=2
HP http://marc.info/?l=bugtraq&m=144061542602287&w=2
MLIST http://openwall.com/lists/oss-security/2015/05/20/8
HP http://marc.info/?l=bugtraq&m=143637549705650&w=2
HP http://marc.info/?l=bugtraq&m=144104533800819&w=2
SUSE http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html
HP http://marc.info/?l=bugtraq&m=143506486712441&w=2
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21959530
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21959636
HP http://marc.info/?l=bugtraq&m=144043644216842&w=2
HP http://marc.info/?l=bugtraq&m=143557934009303&w=2
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21959481
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21959453
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21959325
HP http://marc.info/?l=bugtraq&m=143558092609708&w=2
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21962455
HP http://marc.info/?l=bugtraq&m=143628304012255&w=2
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html
CONFIRM http://support.apple.com/kb/HT204942
REDHAT http://rhn.redhat.com/errata/RHSA-2015-1526.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html
SUSE http://lists.opensuse.org/opensuse-updates/2015-07/msg00016.html
HP http://marc.info/?l=bugtraq&m=144060606031437&w=2
REDHAT http://rhn.redhat.com/errata/RHSA-2015-1072.html
HP http://marc.info/?l=bugtraq&m=144060576831314&w=2
HP http://marc.info/?l=bugtraq&m=144050121701297&w=2
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21959812
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21959517
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21961717
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21962739
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21959195
SUSE http://lists.opensuse.org/opensuse-updates/2016-02/msg00094.html
CONFIRM http://www-304.ibm.com/support/docview.wss?uid=swg21959132
CONFIRM http://support.citrix.com/article/CTX201114
CONFIRM http://www-304.ibm.com/support/docview.wss?uid=swg21958984
HP http://marc.info/?l=bugtraq&m=144102017024820&w=2
SECTRACK http://www.securitytracker.com/id/1032637
SECTRACK http://www.securitytracker.com/id/1032856
SECTRACK http://www.securitytracker.com/id/1033208
CONFIRM http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
CONFIRM http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
SECTRACK http://www.securitytracker.com/id/1032474
SECTRACK http://www.securitytracker.com/id/1033341
DEBIAN http://www.debian.org/security/2015/dsa-3300
SECTRACK http://www.securitytracker.com/id/1032647
CONFIRM http://www-304.ibm.com/support/docview.wss?uid=swg21962816
CONFIRM http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
CONFIRM http://www.fortiguard.com/advisory/2015-05-20-logjam-attack
SECTRACK http://www.securitytracker.com/id/1032476
SECTRACK http://www.securitytracker.com/id/1032777
CONFIRM http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
SECTRACK http://www.securitytracker.com/id/1032645
SECTRACK http://www.securitytracker.com/id/1033209
SECTRACK http://www.securitytracker.com/id/1032650
SECTRACK http://www.securitytracker.com/id/1032783
BID http://www.securityfocus.com/bid/74733
SECTRACK http://www.securitytracker.com/id/1032884
SECTRACK http://www.securitytracker.com/id/1033210
SECTRACK http://www.securitytracker.com/id/1032778
SECTRACK http://www.securitytracker.com/id/1032727
DEBIAN http://www.debian.org/security/2015/dsa-3339
CONFIRM http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
SECTRACK http://www.securitytracker.com/id/1032653
CONFIRM http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
CONFIRM http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
SECTRACK http://www.securitytracker.com/id/1032784
SECTRACK http://www.securitytracker.com/id/1032699
SECTRACK http://www.securitytracker.com/id/1032702
SECTRACK http://www.securitytracker.com/id/1032688
CONFIRM http://www-304.ibm.com/support/docview.wss?uid=swg21967893
SECTRACK http://www.securitytracker.com/id/1033064
SECTRACK http://www.securitytracker.com/id/1032871
SECTRACK http://www.securitytracker.com/id/1032654
SECTRACK http://www.securitytracker.com/id/1032864
SECTRACK http://www.securitytracker.com/id/1032648
SECTRACK http://www.securitytracker.com/id/1032649
CONFIRM http://www.mozilla.org/security/announce/2015/mfsa2015-70.html
SECTRACK http://www.securitytracker.com/id/1032651
SECTRACK http://www.securitytracker.com/id/1032655
MISC https://weakdh.org/imperfect-forward-secrecy.pdf
CONFIRM https://www.openssl.org/news/secadv_20150611.txt
SECTRACK http://www.securitytracker.com/id/1034087
CONFIRM https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193083
CONFIRM https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128722
GENTOO https://security.gentoo.org/glsa/201603-11
SECTRACK http://www.securitytracker.com/id/1033430
UBUNTU http://www.ubuntu.com/usn/USN-2673-1
SECTRACK http://www.securitytracker.com/id/1033416
CONFIRM https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04953655
SECTRACK http://www.securitytracker.com/id/1033991
UBUNTU http://www.ubuntu.com/usn/USN-2656-1
SECTRACK http://www.securitytracker.com/id/1034728
CONFIRM https://kc.mcafee.com/corporate/index?page=content&id=SB10122
CONFIRM https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
SECTRACK http://www.securitytracker.com/id/1033760
CONFIRM https://bugzilla.mozilla.org/show_bug.cgi?id=1138554
CONFIRM https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.1_release_notes
CONFIRM https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
UBUNTU http://www.ubuntu.com/usn/USN-2706-1
CONFIRM https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/
CONFIRM https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
CONFIRM https://openssl.org/news/secadv/20150611.txt
CONFIRM https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04740527
GENTOO https://security.gentoo.org/glsa/201512-10
CONFIRM https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
CONFIRM https://www-304.ibm.com/support/docview.wss?uid=swg21959745
SECTRACK http://www.securitytracker.com/id/1034884
GENTOO https://security.gentoo.org/glsa/201506-02
SECTRACK http://www.securitytracker.com/id/1033891
MISC https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/
CONFIRM http://www.solarwinds.com/documentation/storage/storagemanager/docs/ReleaseNotes/releaseNotes.htm
UBUNTU http://www.ubuntu.com/usn/USN-2696-1
CONFIRM https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098403
CONFIRM https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
CONFIRM https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04918839
CONFIRM https://www.suse.com/security/cve/CVE-2015-4000.html
GENTOO https://security.gentoo.org/glsa/201701-46
SECTRACK http://www.securitytracker.com/id/1036218
SECTRACK http://www.securitytracker.com/id/1033065
SECTRACK http://www.securitytracker.com/id/1033019
SECTRACK http://www.securitytracker.com/id/1033067
SECTRACK http://www.securitytracker.com/id/1032910
SECTRACK http://www.securitytracker.com/id/1032932
DEBIAN http://www.debian.org/security/2015/dsa-3316
DEBIAN http://www.debian.org/security/2016/dsa-3688
HP https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04718196
CONFIRM https://security.netapp.com/advisory/ntap-20150619-0001/
CONFIRM https://support.citrix.com/article/CTX216642
CONFIRM https://puppet.com/security/cve/CVE-2015-4000
REDHAT http://rhn.redhat.com/errata/RHSA-2016-2056.html
REDHAT http://rhn.redhat.com/errata/RHSA-2015-1544.html
REDHAT http://rhn.redhat.com/errata/RHSA-2016-1624.html
REDHAT http://rhn.redhat.com/errata/RHSA-2015-1241.html
REDHAT http://rhn.redhat.com/errata/RHSA-2015-1229.html
REDHAT http://rhn.redhat.com/errata/RHSA-2015-1185.html
REDHAT http://rhn.redhat.com/errata/RHSA-2015-1230.html
REDHAT http://rhn.redhat.com/errata/RHSA-2015-1604.html
REDHAT http://rhn.redhat.com/errata/RHSA-2015-1488.html
REDHAT http://rhn.redhat.com/errata/RHSA-2015-1486.html
SECTRACK http://www.securitytracker.com/id/1040630
HP http://marc.info/?l=bugtraq&m=144493176821532&w=2
HP http://marc.info/?l=bugtraq&m=143880121627664&w=2
DEBIAN http://www.debian.org/security/2015/dsa-3324
CONFIRM https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03831en_us
UBUNTU http://www.ubuntu.com/usn/USN-2656-2
SECTRACK http://www.securitytracker.com/id/1032960
CONFIRM https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
CONFIRM http://www-304.ibm.com/support/docview.wss?uid=swg21960380
SECTRACK http://www.securitytracker.com/id/1032865
BID http://www.securityfocus.com/bid/91787
SECTRACK http://www.securitytracker.com/id/1032652
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html
SECTRACK http://www.securitytracker.com/id/1032759
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21959111
SECTRACK http://www.securitytracker.com/id/1033513
SECTRACK http://www.securitytracker.com/id/1033385
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21960191
CONFIRM http://www-304.ibm.com/support/docview.wss?uid=swg21960194
SECTRACK http://www.securitytracker.com/id/1033222
HP http://marc.info/?l=bugtraq&m=144069189622016&w=2
CONFIRM http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04949778
SECTRACK http://www.securitytracker.com/id/1032656
SECTRACK http://www.securitytracker.com/id/1032475
REDHAT http://rhn.redhat.com/errata/RHSA-2015-1228.html
DEBIAN http://www.debian.org/security/2015/dsa-3287
CONFIRM https://bto.bluecoat.com/security-advisory/sa98
REDHAT http://rhn.redhat.com/errata/RHSA-2015-1197.html
MISC https://weakdh.org/
HP http://marc.info/?l=bugtraq&m=143655800220052&w=2
SECTRACK http://www.securitytracker.com/id/1033433
CONFIRM http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10681
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21959539
CONFIRM http://www-304.ibm.com/support/docview.wss?uid=swg21960041
CONFIRM https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923929
CONFIRM https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
CONFIRM https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
REDHAT http://rhn.redhat.com/errata/RHSA-2015-1242.html
REDHAT http://rhn.redhat.com/errata/RHSA-2015-1485.html
REDHAT http://rhn.redhat.com/errata/RHSA-2015-1243.html
CONFIRM http://www-304.ibm.com/support/docview.wss?uid=swg21960418

History of changes

Date Event
2019-10-09 23:14
2019-02-12 17:39
2018-11-30 21:30
2018-10-30 16:27
2018-05-10 01:29
2018-04-06 01:29
2018-01-05 02:30
2017-12-09 02:29
2017-11-15 02:29
2017-11-10 02:29
2017-11-08 02:29
2017-11-04 01:29
2017-09-22 05:32
2017-09-21 06:31
2017-09-01 05:57
2017-07-01 05:30
2015-05-21 00:59

New CVE