CVE Vulnerabilities

CVE-2015-0204

Published: Jan 09, 2015 | Modified: Apr 12, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V3
5.3 MODERATE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the FREAK issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.

Affected Software

NameVendorStart VersionEnd Version
OpensslOpenssl*0.9.8zc (including)
OpensslOpenssl1.0.0a (including)1.0.0a (including)
OpensslOpenssl1.0.0b (including)1.0.0b (including)
OpensslOpenssl1.0.0c (including)1.0.0c (including)
OpensslOpenssl1.0.0d (including)1.0.0d (including)
OpensslOpenssl1.0.0e (including)1.0.0e (including)
OpensslOpenssl1.0.0f (including)1.0.0f (including)
OpensslOpenssl1.0.0g (including)1.0.0g (including)
OpensslOpenssl1.0.0h (including)1.0.0h (including)
OpensslOpenssl1.0.0i (including)1.0.0i (including)
OpensslOpenssl1.0.0j (including)1.0.0j (including)
OpensslOpenssl1.0.0k (including)1.0.0k (including)
OpensslOpenssl1.0.0l (including)1.0.0l (including)
OpensslOpenssl1.0.0m (including)1.0.0m (including)
OpensslOpenssl1.0.0n (including)1.0.0n (including)
OpensslOpenssl1.0.0o (including)1.0.0o (including)
OpensslOpenssl1.0.1a (including)1.0.1a (including)
OpensslOpenssl1.0.1b (including)1.0.1b (including)
OpensslOpenssl1.0.1c (including)1.0.1c (including)
OpensslOpenssl1.0.1d (including)1.0.1d (including)
OpensslOpenssl1.0.1e (including)1.0.1e (including)
OpensslOpenssl1.0.1f (including)1.0.1f (including)
OpensslOpenssl1.0.1g (including)1.0.1g (including)
OpensslOpenssl1.0.1h (including)1.0.1h (including)
OpensslOpenssl1.0.1i (including)1.0.1i (including)
OpensslOpenssl1.0.1j (including)1.0.1j (including)
Red Hat Enterprise Linux 5RedHatopenssl-0:0.9.8e-33.el5_11*
Red Hat Enterprise Linux 6RedHatopenssl-0:1.0.1e-30.el6_6.5*
Red Hat Enterprise Linux 7RedHatopenssl-1:1.0.1e-34.el7_0.7*
Red Hat JBoss Enterprise Application Platform 6.4RedHat*
Red Hat JBoss Web Server 2.1RedHatopenssl*
Red Hat JBoss Web Server 3.0RedHat*
OpensslUbuntuartful*
OpensslUbuntubionic*
OpensslUbuntucosmic*
OpensslUbuntudevel*
OpensslUbuntudisco*
OpensslUbuntuesm-infra-legacy/trusty*
OpensslUbuntuesm-infra/bionic*
OpensslUbuntuesm-infra/xenial*
OpensslUbuntulucid*
OpensslUbuntuprecise*
OpensslUbuntutrusty*
OpensslUbuntutrusty/esm*
OpensslUbuntuupstream*
OpensslUbuntuutopic*
OpensslUbuntuvivid*
OpensslUbuntuvivid/stable-phone-overlay*
OpensslUbuntuvivid/ubuntu-core*
OpensslUbuntuwily*
OpensslUbuntuxenial*
OpensslUbuntuyakkety*
OpensslUbuntuzesty*
Openssl098Ubuntuprecise*
Openssl098Ubuntutrusty*
Openssl098Ubuntuupstream*
Openssl098Ubuntuutopic*
Openssl098Ubuntuvivid*

References