CVE-2015-2808

CVSS V2 Medium 5 CVSS V3 None
Description
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
Overview
  • CVE ID
  • CVE-2015-2808
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2015-04-01T02:00:35
  • Last Modified Date
  • 2020-11-23T19:47:50
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:a:oracle:communications_application_session_controller:*:*:*:*:*:*:*:* 1 OR 3.0.0 3.9.0
cpe:2.3:a:oracle:communications_policy_management:*:*:*:*:*:*:*:* 1 OR 9.9.2
cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:http_server:11.1.1.9.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:http_server:12.1.3.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:http_server:12.2.1.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:http_server:12.2.1.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:* 1 OR 3.0.0 3.2.11
cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:* 1 OR 4.0.0 4.0.4
AND
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:* 1 OR
cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:* 1 OR
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:* 1 OR
AND
cpe:2.3:a:suse:manager:1.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:* 0 OR
AND
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:* 0 OR
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:fujitsu:sparc_enterprise_m3000_firmware:*:*:*:*:*:*:*:* 1 OR xcp xcp_1121
cpe:2.3:h:fujitsu:sparc_enterprise_m3000:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:fujitsu:sparc_enterprise_m4000_firmware:*:*:*:*:*:*:*:* 1 OR xcp xcp_1121
cpe:2.3:h:fujitsu:sparc_enterprise_m4000:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:fujitsu:sparc_enterprise_m5000_firmware:*:*:*:*:*:*:*:* 1 OR xcp xcp_1121
cpe:2.3:h:fujitsu:sparc_enterprise_m5000:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:fujitsu:sparc_enterprise_m8000_firmware:*:*:*:*:*:*:*:* 1 OR xcp xcp_1121
cpe:2.3:h:fujitsu:sparc_enterprise_m8000:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:fujitsu:sparc_enterprise_m9000_firmware:*:*:*:*:*:*:*:* 1 OR xcp xcp_1121
cpe:2.3:h:fujitsu:sparc_enterprise_m9000:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:e6000_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:e6000:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:e9000_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:e9000:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:oceanstor_18500_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:oceanstor_18500:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:oceanstor_18800_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:oceanstor_18800:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:oceanstor_18800f_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:oceanstor_18800f:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:oceanstor_9000_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:oceanstor_9000:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:oceanstor_cse_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:oceanstor_cse:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:oceanstor_hvs85t_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:oceanstor_hvs85t:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:oceanstor_s2600t_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:oceanstor_s2600t:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:oceanstor_s5500t_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:oceanstor_s5500t:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:oceanstor_s5600t_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:oceanstor_s5600t:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:oceanstor_s5800t_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:oceanstor_s5800t:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:oceanstor_s6800t_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:oceanstor_s6800t:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:oceanstor_vis6600t_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:oceanstor_vis6600t:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:quidway_s9300_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:quidway_s9300:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:s7700_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:s7700_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:9700_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:9700:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:9700_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:9700:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:s12700_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:s12700_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:s2700_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:s3700_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:s5700ei_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:s5700ei:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:s5700hi_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:s5700hi:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:s5700si_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:s5700si:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:s5710ei_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:s5710ei:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:s5710hi_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:s5710hi:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:s6700_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:s2750_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:s2750:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:s5700li_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:s5700li:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:s5700s-li_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:s5700s-li:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:s5720hi_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:s2750_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:s2750:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:s5700li_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:s5700li:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:s5700s-li_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:s5700s-li:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:s5720hi_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:s5720ei_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:s5720ei:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:huawei:te60_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:a:huawei:oceanstor_replicationdirector:v100r003c00:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:huawei:policy_center:v100r003c00:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:huawei:policy_center:v100r003c10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:huawei:smc2.0:v100r002c01:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:huawei:smc2.0:v100r002c02:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:huawei:smc2.0:v100r002c03:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:huawei:smc2.0:v100r002c04:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:huawei:ultravr:v100r003c00:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:a:ibm:cognos_metrics_manager:10.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:ibm:cognos_metrics_manager:10.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:ibm:cognos_metrics_manager:10.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:ibm:cognos_metrics_manager:10.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:ibm:cognos_metrics_manager:10.2.2:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:P/I:N/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • NONE
  • Availability Impact
  • NONE
  • Base Score
  • 5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 10
  • Impact Score
  • 2.9
References
Reference URL Reference Tags
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf Technical Description Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21883640 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html Third Party Advisory
http://marc.info/?l=bugtraq&m=143817021313142&w=2 Issue Tracking Third Party Advisory
http://marc.info/?l=bugtraq&m=143817899717054&w=2 Issue Tracking Third Party Advisory
http://marc.info/?l=bugtraq&m=143741441012338&w=2 Issue Tracking Third Party Advisory
http://marc.info/?l=bugtraq&m=143818140118771&w=2 Issue Tracking Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html Third Party Advisory
http://www.huawei.com/en/psirt/security-advisories/hw-454055 Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988 Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html Third Party Advisory
http://www.securityfocus.com/bid/91787 Third Party Advisory VDB Entry
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347 Third Party Advisory
http://marc.info/?l=bugtraq&m=144060576831314&w=2 Issue Tracking Third Party Advisory
http://marc.info/?l=bugtraq&m=144069189622016&w=2 Issue Tracking Third Party Advisory
http://marc.info/?l=bugtraq&m=144493176821532&w=2 Issue Tracking Third Party Advisory
http://marc.info/?l=bugtraq&m=144102017024820&w=2 Issue Tracking Third Party Advisory
http://marc.info/?l=bugtraq&m=143629696317098&w=2 Issue Tracking Third Party Advisory
http://marc.info/?l=bugtraq&m=144043644216842&w=2 Issue Tracking Third Party Advisory
http://marc.info/?l=bugtraq&m=144059660127919&w=2 Issue Tracking Third Party Advisory
http://marc.info/?l=bugtraq&m=144059703728085&w=2 Issue Tracking Third Party Advisory
http://marc.info/?l=bugtraq&m=144104565600964&w=2 Issue Tracking Third Party Advisory
http://marc.info/?l=bugtraq&m=143456209711959&w=2 Issue Tracking Third Party Advisory
http://marc.info/?l=bugtraq&m=144104533800819&w=2 Issue Tracking Third Party Advisory
http://marc.info/?l=bugtraq&m=144060606031437&w=2 Issue Tracking Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935 Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888 Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10163 Broken Link
http://www.securitytracker.com/id/1032599 Third Party Advisory VDB Entry
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html Mailing List Third Party Advisory
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789 Third Party Advisory
https://security.gentoo.org/glsa/201512-10 Third Party Advisory
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html Mailing List Third Party Advisory
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709 Third Party Advisory
http://www.securitytracker.com/id/1033769 Third Party Advisory VDB Entry
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 Third Party Advisory
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034 Third Party Advisory
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 Third Party Advisory
http://www.securitytracker.com/id/1033737 Third Party Advisory VDB Entry
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256 Third Party Advisory
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119 Third Party Advisory
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190 Third Party Advisory
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140 Third Party Advisory
http://www.securitytracker.com/id/1033432 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1033431 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1033415 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1033386 Third Party Advisory VDB Entry
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241 Third Party Advisory
http://www.ubuntu.com/usn/USN-2706-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2696-1 Third Party Advisory
http://www.debian.org/security/2015/dsa-3339 Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1526.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html Mailing List Third Party Advisory
http://www-304.ibm.com/support/docview.wss?uid=swg21960769 Third Party Advisory
http://www-304.ibm.com/support/docview.wss?uid=swg21960015 Third Party Advisory
http://www-304.ibm.com/support/docview.wss?uid=swg21903565 Third Party Advisory
http://www.securitytracker.com/id/1032868 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1032858 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1032788 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1032734 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1032708 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1032707 Third Party Advisory VDB Entry
http://rhn.redhat.com/errata/RHSA-2015-1091.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1021.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1020.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1007.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1006.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html Mailing List Third Party Advisory
http://www.securityfocus.com/bid/73684 Third Party Advisory VDB Entry
https://kb.juniper.net/JSA10783 Third Party Advisory
http://www.securitytracker.com/id/1036222 Third Party Advisory VDB Entry
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380 Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650 Third Party Advisory
http://www.securitytracker.com/id/1033072 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1033071 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1032990 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1032910 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1032600 Third Party Advisory VDB Entry
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html Third Party Advisory
http://www.debian.org/security/2015/dsa-3316 Third Party Advisory
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922 Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1243.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1242.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1241.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1230.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1229.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1228.html Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html Patch Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 16:19:10 Added to TrackCVE
2022-12-02 04:06:55 2015-04-01T02:00Z 2015-04-01T02:00:35 CVE Published Date updated
2022-12-02 04:06:55 2020-11-23T19:47:50 CVE Modified Date updated
2022-12-02 04:06:55 Analyzed Vulnerability Status updated