CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Vulnerability Details : CVE-2015-4000

The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
Publish Date : 2015-05-20 Last Update Date : 2018-11-30
Search Twitter   Search YouTube   Search Google

- CVSS Scores & Vulnerability Types

CVSS Score
4.3
Confidentiality Impact None (There is no impact to the confidentiality of the system.)
Integrity Impact Partial (Modification of some system files or information is possible, but the attacker does not have control over what can be modified, or the scope of what the attacker can affect is limited.)
Availability Impact None (There is no impact to the availability of the system.)
Access Complexity Medium (The access conditions are somewhat specialized. Some preconditions must be satistified to exploit)
Authentication Not required (Authentication is not required to exploit the vulnerability.)
Gained Access None
Vulnerability Type(s)
CWE ID 310

- Related OVAL Definitions

Title Definition Id Class Family
AIX Logjam Vulnerability oval:org.mitre.oval:def:29329 unix
HP-UX OpenSSL Vulnerability (DHE man-in-the-middle protection (Logjam)) oval:org.mitre.oval:def:29478 unix
RHSA-2015:1072: openssl security update (Moderate) oval:com.redhat.rhsa:def:20151072 unix
RHSA-2015:1185: nss security update (Moderate) oval:com.redhat.rhsa:def:20151185 unix
RHSA-2015:1197: openssl security update (Moderate) oval:com.redhat.rhsa:def:20151197 unix
RHSA-2015:1228: java-1.8.0-openjdk security update (Important) oval:com.redhat.rhsa:def:20151228 unix
RHSA-2015:1229: java-1.7.0-openjdk security update (Critical) oval:com.redhat.rhsa:def:20151229 unix
RHSA-2015:1230: java-1.7.0-openjdk security update (Important) oval:com.redhat.rhsa:def:20151230 unix
RHSA-2015:1241: java-1.8.0-oracle security update (Critical) oval:com.redhat.rhsa:def:20151241 unix
RHSA-2015:1242: java-1.7.0-oracle security update (Critical) oval:com.redhat.rhsa:def:20151242 unix
RHSA-2015:1243: java-1.6.0-sun security update (Important) oval:com.redhat.rhsa:def:20151243 unix
RHSA-2015:1485: java-1.7.1-ibm security update (Critical) oval:com.redhat.rhsa:def:20151485 unix
RHSA-2015:1486: java-1.6.0-ibm security update (Critical) oval:com.redhat.rhsa:def:20151486 unix
RHSA-2015:1488: java-1.7.0-ibm security update (Critical) oval:com.redhat.rhsa:def:20151488 unix
RHSA-2015:1526: java-1.6.0-openjdk security update (Important) oval:com.redhat.rhsa:def:20151526 unix
RHSA-2015:1544: java-1.5.0-ibm security update (Important) oval:com.redhat.rhsa:def:20151544 unix
SUSE-SU-2015:1150-1 -- Security update for compat-openssl098 (important) oval:org.mitre.oval:def:29252 unix
SUSE-SU-2015:1143-1 -- Security update for openssl (important) oval:org.mitre.oval:def:28265 unix
OVAL (Open Vulnerability and Assessment Language) definitions define exactly what should be done to verify a vulnerability or a missing patch. Check out the OVAL definitions if you want to learn what you should do to verify a vulnerability.

- Products Affected By CVE-2015-4000

# Product Type Vendor Product Version Update Edition Language
1 OS Apple Iphone Os 8.3 Version Details Vulnerabilities
2 OS Apple Mac Os X 10.10.3 Version Details Vulnerabilities
3 Application Apple Safari Version Details Vulnerabilities
4 OS Canonical Ubuntu Linux 12.04 ~~lts~~~ Version Details Vulnerabilities
5 OS Canonical Ubuntu Linux 14.04 ~~lts~~~ Version Details Vulnerabilities
6 OS Canonical Ubuntu Linux 14.10 Version Details Vulnerabilities
7 OS Canonical Ubuntu Linux 15.04 Version Details Vulnerabilities
8 OS Debian Debian Linux 7.0 Version Details Vulnerabilities
9 OS Debian Debian Linux 8.0 Version Details Vulnerabilities
10 Application Google Chrome - Version Details Vulnerabilities
11 OS HP Hp-ux B.11.31 Version Details Vulnerabilities
12 Application IBM Content Manager 8.5 ~~~enterprise~~ Version Details Vulnerabilities
13 Application Microsoft IE Version Details Vulnerabilities
14 Application Mozilla Firefox Version Details Vulnerabilities
15 Application Mozilla Firefox 39.0 Version Details Vulnerabilities
16 Application Mozilla Firefox Esr 31.8 Version Details Vulnerabilities
17 Application Mozilla Firefox Esr 38.1.0 Version Details Vulnerabilities
18 OS Mozilla Firefox Os 2.2 Version Details Vulnerabilities
19 Application Mozilla Network Security Services 3.19 Version Details Vulnerabilities
20 Application Mozilla Seamonkey 2.35 Version Details Vulnerabilities
21 Application Mozilla Thunderbird 31.8 Version Details Vulnerabilities
22 Application Mozilla Thunderbird 38.1 Version Details Vulnerabilities
23 Application Openssl Openssl 1.0.1m Version Details Vulnerabilities
24 Application Openssl Openssl 1.0.2a Version Details Vulnerabilities
25 Application Opera Opera Browser - Version Details Vulnerabilities
26 Application Oracle JDK 1.6.0 Update 95 Version Details Vulnerabilities
27 Application Oracle JDK 1.7.0 Update 80 Version Details Vulnerabilities
28 Application Oracle JDK 1.7.0 Update 75 Version Details Vulnerabilities
29 Application Oracle JDK 1.8.0 Update 33 Version Details Vulnerabilities
30 Application Oracle JDK 1.8.0 Update 45 Version Details Vulnerabilities
31 Application Oracle JRE 1.6.0 Update 95 Version Details Vulnerabilities
32 Application Oracle JRE 1.7.0 Update 80 Version Details Vulnerabilities
33 Application Oracle JRE 1.7.0 Update 75 Version Details Vulnerabilities
34 Application Oracle JRE 1.8.0 Update 33 Version Details Vulnerabilities
35 Application Oracle JRE 1.8.0 Update 45 Version Details Vulnerabilities
36 Application Oracle Jrockit R28.3.6 Version Details Vulnerabilities
37 Application Oracle Sparc-opl Service Processor 1121 Version Details Vulnerabilities
38 OS Suse Linux Enterprise Desktop 12 Version Details Vulnerabilities
39 OS Suse Linux Enterprise Server 11.0 SP4 Version Details Vulnerabilities
40 OS Suse Linux Enterprise Software Development Kit 12 Version Details Vulnerabilities
41 OS Suse Suse Linux Enterprise Server 12 Version Details Vulnerabilities

- Number Of Affected Versions By Product

Vendor Product Vulnerable Versions
Apple Iphone Os 1
Apple Mac Os X 1
Apple Safari 1
Canonical Ubuntu Linux 4
Debian Debian Linux 2
Google Chrome 1
HP Hp-ux 1
IBM Content Manager 1
Microsoft IE 1
Mozilla Firefox 2
Mozilla Firefox Esr 2
Mozilla Firefox Os 1
Mozilla Network Security Services 1
Mozilla Seamonkey 1
Mozilla Thunderbird 2
Openssl Openssl 2
Opera Opera Browser 1
Oracle JDK 5
Oracle JRE 5
Oracle Jrockit 1
Oracle Sparc-opl Service Processor 1
Suse Linux Enterprise Desktop 1
Suse Linux Enterprise Server 1
Suse Linux Enterprise Software Development Kit 1
Suse Suse Linux Enterprise Server 1

- References For CVE-2015-4000

https://www.openssl.org/news/secadv_20150611.txt CONFIRM
https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/ CONFIRM
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098403 CONFIRM
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html CONFIRM
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html CONFIRM
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04876402 CONFIRM
http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
APPLE APPLE-SA-2015-06-30-1
https://weakdh.org/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03831en_us CONFIRM
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727 CONFIRM
https://security.gentoo.org/glsa/201512-10
GENTOO GLSA-201512-10
https://security.gentoo.org/glsa/201603-11
GENTOO GLSA-201603-11
https://security.gentoo.org/glsa/201701-46
GENTOO GLSA-201701-46
https://security.netapp.com/advisory/ntap-20150619-0001/ CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html
SUSE SUSE-SU-2015:1581
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html
SUSE SUSE-SU-2015:1663
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140 CONFIRM
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190 CONFIRM
https://security.gentoo.org/glsa/201506-02
GENTOO GLSA-201506-02
https://openssl.org/news/secadv/20150611.txt CONFIRM
https://puppet.com/security/cve/CVE-2015-4000 CONFIRM
https://kc.mcafee.com/corporate/index?page=content&id=SB10122 CONFIRM
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes CONFIRM
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193083 CONFIRM
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128722 CONFIRM
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763 CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
SUSE openSUSE-SU-2015:1289
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 CONFIRM
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04953655 CONFIRM
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04740527 CONFIRM
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789 CONFIRM
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923929 CONFIRM
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119 CONFIRM
https://support.citrix.com/article/CTX216642 CONFIRM
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241 CONFIRM
https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04718196
HP SSRT102112
http://www.ubuntu.com/usn/USN-2696-1
UBUNTU USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
UBUNTU USN-2706-1
https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/
https://bto.bluecoat.com/security-advisory/sa98 CONFIRM
https://bugzilla.mozilla.org/show_bug.cgi?id=1138554 CONFIRM
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.1_release_notes CONFIRM
http://www.ubuntu.com/usn/USN-2656-1
UBUNTU USN-2656-1
http://www.ubuntu.com/usn/USN-2656-2
UBUNTU USN-2656-2
http://www.ubuntu.com/usn/USN-2673-1
UBUNTU USN-2673-1
http://www.securitytracker.com/id/1034728
SECTRACK 1034728
http://www.securitytracker.com/id/1034884
SECTRACK 1034884
http://www.securitytracker.com/id/1036218
SECTRACK 1036218
http://www.securitytracker.com/id/1040630
SECTRACK 1040630
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04918839 CONFIRM
http://www.solarwinds.com/documentation/storage/storagemanager/docs/ReleaseNotes/releaseNotes.htm CONFIRM
http://www.securitytracker.com/id/1034087
SECTRACK 1034087
http://www.securitytracker.com/id/1033991
SECTRACK 1033991
http://www.securitytracker.com/id/1033891
SECTRACK 1033891
http://www.securitytracker.com/id/1033760
SECTRACK 1033760
http://www.securitytracker.com/id/1033513
SECTRACK 1033513
http://www.securitytracker.com/id/1033433
SECTRACK 1033433
http://www.securitytracker.com/id/1033385
SECTRACK 1033385
http://www.securitytracker.com/id/1033430
SECTRACK 1033430
http://www.securitytracker.com/id/1033416
SECTRACK 1033416
http://www.securitytracker.com/id/1033341
SECTRACK 1033341
http://www.securitytracker.com/id/1033222
SECTRACK 1033222
http://www.securitytracker.com/id/1033210
SECTRACK 1033210
http://www.securitytracker.com/id/1033209
SECTRACK 1033209
http://www.securitytracker.com/id/1033208
SECTRACK 1033208
http://www.securitytracker.com/id/1033067
SECTRACK 1033067
http://www.securitytracker.com/id/1033065
SECTRACK 1033065
http://www.securitytracker.com/id/1033064
SECTRACK 1033064
http://www.securitytracker.com/id/1033019
SECTRACK 1033019
http://www.securitytracker.com/id/1032960
SECTRACK 1032960
http://www.securitytracker.com/id/1032932
SECTRACK 1032932
http://www.securitytracker.com/id/1032910
SECTRACK 1032910
http://www.securitytracker.com/id/1032884
SECTRACK 1032884
http://www.securitytracker.com/id/1032871
SECTRACK 1032871
http://www.securitytracker.com/id/1032865
SECTRACK 1032865
http://www.securitytracker.com/id/1032864
SECTRACK 1032864
http://www.securitytracker.com/id/1032777
SECTRACK 1032777
http://www.securitytracker.com/id/1032778
SECTRACK 1032778
http://www.securitytracker.com/id/1032783
SECTRACK 1032783
http://www.securitytracker.com/id/1032856
SECTRACK 1032856
http://www.securitytracker.com/id/1032784
SECTRACK 1032784
http://www.securitytracker.com/id/1032759
SECTRACK 1032759
http://www.securitytracker.com/id/1032727
SECTRACK 1032727
http://www.securitytracker.com/id/1032702
SECTRACK 1032702
http://www.securitytracker.com/id/1032699
SECTRACK 1032699
http://www.securitytracker.com/id/1032688
SECTRACK 1032688
http://www.securitytracker.com/id/1032656
SECTRACK 1032656
http://www.securitytracker.com/id/1032655
SECTRACK 1032655
http://www.securitytracker.com/id/1032654
SECTRACK 1032654
http://www.securitytracker.com/id/1032653
SECTRACK 1032653
http://www.securitytracker.com/id/1032652
SECTRACK 1032652
http://www.securitytracker.com/id/1032651
SECTRACK 1032651
http://www.securitytracker.com/id/1032650
SECTRACK 1032650
http://www.securitytracker.com/id/1032649
SECTRACK 1032649
http://www.securitytracker.com/id/1032648
SECTRACK 1032648
http://www.securitytracker.com/id/1032647
SECTRACK 1032647
http://www.securitytracker.com/id/1032645
SECTRACK 1032645
http://www.securitytracker.com/id/1032474
SECTRACK 1032474
http://www.securitytracker.com/id/1032475
SECTRACK 1032475
http://www.securitytracker.com/id/1032476
SECTRACK 1032476
http://www.securitytracker.com/id/1032637
SECTRACK 1032637
http://www.securityfocus.com/bid/91787
BID 91787 Oracle July 2016 Critical Patch Update Multiple Vulnerabilities Release Date:2018-10-15
http://www.securityfocus.com/bid/74733
BID 74733 SSL/TLS LogJam Man in the Middle Security Bypass Vulnerability Release Date:2018-10-08
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html CONFIRM
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html CONFIRM
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html CONFIRM
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html CONFIRM
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html CONFIRM
http://www.fortiguard.com/advisory/2015-05-20-logjam-attack CONFIRM
http://www.mozilla.org/security/announce/2015/mfsa2015-70.html CONFIRM
http://www.debian.org/security/2016/dsa-3688
DEBIAN DSA-3688
http://www.debian.org/security/2015/dsa-3324
DEBIAN DSA-3324
http://www.debian.org/security/2015/dsa-3339
DEBIAN DSA-3339
http://www-304.ibm.com/support/docview.wss?uid=swg21967893 CONFIRM
http://www.debian.org/security/2015/dsa-3287
DEBIAN DSA-3287
http://www.debian.org/security/2015/dsa-3300
DEBIAN DSA-3300
http://www.debian.org/security/2015/dsa-3316
DEBIAN DSA-3316
http://www-304.ibm.com/support/docview.wss?uid=swg21960194 CONFIRM
http://www-304.ibm.com/support/docview.wss?uid=swg21960380 CONFIRM
http://www-304.ibm.com/support/docview.wss?uid=swg21960418 CONFIRM
http://www-304.ibm.com/support/docview.wss?uid=swg21962816 CONFIRM
http://www-304.ibm.com/support/docview.wss?uid=swg21960041 CONFIRM
http://www-304.ibm.com/support/docview.wss?uid=swg21959132 CONFIRM
http://www-304.ibm.com/support/docview.wss?uid=swg21958984 CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21962739 CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21962455 CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21959517 CONFIRM
http://marc.info/?l=bugtraq&m=144050121701297&w=2
HP HPSBGN03404
http://marc.info/?l=bugtraq&m=144060576831314&w=2
HP HPSBGN03399
http://marc.info/?l=bugtraq&m=144060606031437&w=2
HP HPSBGN03405
http://marc.info/?l=bugtraq&m=144061542602287&w=2
HP HPSBGN03411
http://marc.info/?l=bugtraq&m=144069189622016&w=2
HP HPSBGN03402
http://marc.info/?l=bugtraq&m=144102017024820&w=2
HP HPSBGN03407
http://marc.info/?l=bugtraq&m=144104533800819&w=2
HP HPSBMU03401
http://marc.info/?l=bugtraq&m=144493176821532&w=2
HP HPSBUX03512
http://marc.info/?l=bugtraq&m=145409266329539&w=2
HP HPSBGN03533
http://openwall.com/lists/oss-security/2015/05/20/8
MLIST [oss-security] 20150520 CVE-2015-4000 - TLS does not properly convey server's ciphersuite choice
http://rhn.redhat.com/errata/RHSA-2015-1072.html
REDHAT RHSA-2015:1072
http://rhn.redhat.com/errata/RHSA-2015-1185.html
REDHAT RHSA-2015:1185
http://rhn.redhat.com/errata/RHSA-2015-1197.html
REDHAT RHSA-2015:1197
http://rhn.redhat.com/errata/RHSA-2015-1228.html
REDHAT RHSA-2015:1228
http://rhn.redhat.com/errata/RHSA-2015-1229.html
REDHAT RHSA-2015:1229
http://rhn.redhat.com/errata/RHSA-2015-1230.html
REDHAT RHSA-2015:1230
http://rhn.redhat.com/errata/RHSA-2015-1241.html
REDHAT RHSA-2015:1241
http://rhn.redhat.com/errata/RHSA-2015-1242.html
REDHAT RHSA-2015:1242
http://rhn.redhat.com/errata/RHSA-2015-1243.html
REDHAT RHSA-2015:1243
http://rhn.redhat.com/errata/RHSA-2015-1485.html
REDHAT RHSA-2015:1485
http://rhn.redhat.com/errata/RHSA-2015-1486.html
REDHAT RHSA-2015:1486
http://rhn.redhat.com/errata/RHSA-2015-1488.html
REDHAT RHSA-2015:1488
http://rhn.redhat.com/errata/RHSA-2015-1526.html
REDHAT RHSA-2015:1526
http://rhn.redhat.com/errata/RHSA-2015-1544.html
REDHAT RHSA-2015:1544
http://rhn.redhat.com/errata/RHSA-2015-1604.html
REDHAT RHSA-2015:1604
http://rhn.redhat.com/errata/RHSA-2016-1624.html
REDHAT RHSA-2016:1624
http://rhn.redhat.com/errata/RHSA-2016-2056.html
REDHAT RHSA-2016:2056
http://support.apple.com/kb/HT204941 CONFIRM
http://support.apple.com/kb/HT204942 CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21961717 CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21960191 CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21959812 CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21959636 CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21959539 CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21959530 CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21959481 CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21959453 CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21959325 CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21959111 CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21959195 CONFIRM
http://marc.info/?l=bugtraq&m=144043644216842&w=2
HP HPSBMU03345
http://marc.info/?l=bugtraq&m=143880121627664&w=2
HP HPSBUX03388
http://support.citrix.com/article/CTX201114 CONFIRM
http://marc.info/?l=bugtraq&m=143655800220052&w=2
HP HPSBGN03373
http://marc.info/?l=bugtraq&m=143506486712441&w=2
HP HPSBMU03356
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html
SUSE SUSE-SU-2016:0224
http://marc.info/?l=bugtraq&m=143628304012255&w=2
HP HPSBGN03361
http://marc.info/?l=bugtraq&m=143558092609708&w=2
HP HPSBGN03362
http://marc.info/?l=bugtraq&m=143557934009303&w=2
HP HPSBGN03351
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html
SUSE SUSE-SU-2016:0262
http://lists.opensuse.org/opensuse-updates/2015-07/msg00016.html
SUSE openSUSE-SU-2015:1209
http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html
SUSE openSUSE-SU-2015:1684
http://marc.info/?l=bugtraq&m=143637549705650&w=2
HP HPSBUX03363
http://lists.opensuse.org/opensuse-updates/2016-02/msg00097.html
SUSE openSUSE-SU-2016:0483
http://lists.opensuse.org/opensuse-updates/2016-02/msg00094.html
SUSE openSUSE-SU-2016:0478
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
SUSE SUSE-SU-2015:1320
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html
SUSE openSUSE-SU-2016:0261
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html
SUSE openSUSE-SU-2016:0226
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html
SUSE openSUSE-SU-2016:0255
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html
SUSE openSUSE-SU-2015:1229
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
SUSE openSUSE-SU-2015:1266
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
SUSE openSUSE-SU-2015:1277
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
SUSE openSUSE-SU-2015:1288
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html
SUSE SUSE-SU-2015:1449
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
SUSE SUSE-SU-2015:1319
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html
SUSE SUSE-SU-2015:1269
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html
SUSE SUSE-SU-2015:1268
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html
SUSE SUSE-SU-2015:1185
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html
SUSE SUSE-SU-2015:1184
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html
SUSE SUSE-SU-2015:1183
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html
SUSE SUSE-SU-2015:1182
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html
SUSE SUSE-SU-2015:1181
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html
SUSE SUSE-SU-2015:1177
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160117.html
FEDORA FEDORA-2015-9161
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04949778 CONFIRM
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10681 CONFIRM
https://weakdh.org/imperfect-forward-secrecy.pdf
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html
SUSE SUSE-SU-2015:1143
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159314.html
FEDORA FEDORA-2015-9130
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159351.html
FEDORA FEDORA-2015-9048
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html
SUSE openSUSE-SU-2015:1139
https://www-304.ibm.com/support/docview.wss?uid=swg21959745 CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html
SUSE SUSE-SU-2015:1150
http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
APPLE APPLE-SA-2015-06-30-2
http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc CONFIRM
http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery CONFIRM
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc
NETBSD NetBSD-SA2015-008
https://www.suse.com/security/cve/CVE-2015-4000.html CONFIRM

- Metasploit Modules Related To CVE-2015-4000

There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information)


CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.