MEDIUM · 5.9

CVE-2015-7575

Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TL...

Vulnerability Description

Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.

CVSS Score

5.9

MEDIUM

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
MozillaNetwork Security Services<= 3.20.1
OpensuseLeap42.1
OpensuseOpensuse13.1
MozillaFirefox38.0
CanonicalUbuntu Linux14.04

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-7575?

CVE-2015-7575 is a vulnerability with a CVSS score of 5.9 (MEDIUM). Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TL...

How severe is CVE-2015-7575?

CVE-2015-7575 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-7575?

Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Network Security Services, Opensuse Leap, Opensuse Opensuse, Mozilla Firefox, Canonical Ubuntu Linux.