// For flags

CVE-2015-7575

TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH)

Severity Score

5.9
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.

Mozilla Network Security Services (NSS) en versiones anteriores a 3.20.2, tal como se utiliza en Mozilla Firefox en versiones anteriores a 43.0.2 y Firefox ESR 38.x en versiones anteriores a 38.5.2, no rechaza las firmas MD5 en mensajes Server Key Exchange en el tráfico de TLS 1.2 Handshake Protocol, lo que facilita a atacantes man-in-the-middle falsificar servidores desencadenando una colisión.

A flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2015-09-29 CVE Reserved
  • 2016-01-07 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-19: Data Processing Errors
CAPEC
References (55)
URL Date SRC
URL Date SRC
URL Date SRC
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html 2018-10-30
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html 2018-10-30
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html 2018-10-30
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html 2018-10-30
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html 2018-10-30
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html 2018-10-30
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html 2018-10-30
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html 2018-10-30
http://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html 2018-10-30
http://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html 2018-10-30
http://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html 2018-10-30
http://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html 2018-10-30
http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html 2018-10-30
http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html 2018-10-30
http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html 2018-10-30
http://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html 2018-10-30
http://rhn.redhat.com/errata/RHSA-2016-0049.html 2018-10-30
http://rhn.redhat.com/errata/RHSA-2016-0050.html 2018-10-30
http://rhn.redhat.com/errata/RHSA-2016-0053.html 2018-10-30
http://rhn.redhat.com/errata/RHSA-2016-0054.html 2018-10-30
http://rhn.redhat.com/errata/RHSA-2016-0055.html 2018-10-30
http://rhn.redhat.com/errata/RHSA-2016-0056.html 2018-10-30
http://www.debian.org/security/2016/dsa-3436 2018-10-30
http://www.debian.org/security/2016/dsa-3437 2018-10-30
http://www.debian.org/security/2016/dsa-3457 2018-10-30
http://www.debian.org/security/2016/dsa-3458 2018-10-30
http://www.debian.org/security/2016/dsa-3465 2018-10-30
http://www.debian.org/security/2016/dsa-3491 2018-10-30
http://www.debian.org/security/2016/dsa-3688 2018-10-30
http://www.mozilla.org/security/announce/2015/mfsa2015-150.html 2018-10-30
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html 2018-10-30
http://www.ubuntu.com/usn/USN-2863-1 2018-10-30
http://www.ubuntu.com/usn/USN-2864-1 2018-10-30
http://www.ubuntu.com/usn/USN-2865-1 2018-10-30
http://www.ubuntu.com/usn/USN-2866-1 2018-10-30
http://www.ubuntu.com/usn/USN-2884-1 2018-10-30
http://www.ubuntu.com/usn/USN-2904-1 2018-10-30
https://access.redhat.com/errata/RHSA-2016:1430 2018-10-30
https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes 2018-10-30
https://security.gentoo.org/glsa/201701-46 2018-10-30
https://security.gentoo.org/glsa/201706-18 2018-10-30
https://security.gentoo.org/glsa/201801-15 2018-10-30
https://access.redhat.com/security/cve/CVE-2015-7575 2016-07-18
https://bugzilla.redhat.com/show_bug.cgi?id=1289841 2016-07-18
https://access.redhat.com/articles/2112261 2016-07-18
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mozilla
Search vendor "Mozilla"
Network Security Services
Search vendor "Mozilla" for product "Network Security Services"
<= 3.20.1
Search vendor "Mozilla" for product "Network Security Services" and version " <= 3.20.1"
-
Affected
Opensuse
Search vendor "Opensuse"
Leap
Search vendor "Opensuse" for product "Leap"
42.1
Search vendor "Opensuse" for product "Leap" and version "42.1"
-
Affected
Opensuse
Search vendor "Opensuse"
Opensuse
Search vendor "Opensuse" for product "Opensuse"
13.1
Search vendor "Opensuse" for product "Opensuse" and version "13.1"
-
Affected
Opensuse
Search vendor "Opensuse"
Opensuse
Search vendor "Opensuse" for product "Opensuse"
13.2
Search vendor "Opensuse" for product "Opensuse" and version "13.2"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.0
Search vendor "Mozilla" for product "Firefox Esr" and version "38.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.0.1
Search vendor "Mozilla" for product "Firefox Esr" and version "38.0.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.0.5
Search vendor "Mozilla" for product "Firefox Esr" and version "38.0.5"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.1.0
Search vendor "Mozilla" for product "Firefox Esr" and version "38.1.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.1.1
Search vendor "Mozilla" for product "Firefox Esr" and version "38.1.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.2.0
Search vendor "Mozilla" for product "Firefox Esr" and version "38.2.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.2.1
Search vendor "Mozilla" for product "Firefox Esr" and version "38.2.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.3.0
Search vendor "Mozilla" for product "Firefox Esr" and version "38.3.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.4.0
Search vendor "Mozilla" for product "Firefox Esr" and version "38.4.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.5.0
Search vendor "Mozilla" for product "Firefox Esr" and version "38.5.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
38.5.1
Search vendor "Mozilla" for product "Firefox Esr" and version "38.5.1"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
14.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04"
lts
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
15.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "15.04"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
15.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "15.10"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
<= 43.0.1
Search vendor "Mozilla" for product "Firefox" and version " <= 43.0.1"
-
Affected