CVE-2015-8960

The TLS protocol 1.2 and earlier supports the rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh, and ecdsa_fixed_ecdh values for ClientCertificateType but does not directly document the ability to compute the master secret in certain situations with a client secret key and server public key but not a server secret key, which makes it easier for man-in-the-middle attackers to spoof TLS servers by leveraging knowledge of the secret key for an arbitrary installed client X.509 certificate, aka the "Key Compromise Impersonation (KCI)" issue.
References
Link Resource
http://twitter.com/matthew_d_green/statuses/630908726950674433 Press/Media Coverage Technical Description Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/09/20/4 Mailing List Technical Description Third Party Advisory
http://www.securityfocus.com/bid/93071 Broken Link Third Party Advisory VDB Entry
https://kcitls.org Exploit Technical Description
https://security.netapp.com/advisory/ntap-20180626-0002/ Third Party Advisory
https://www.usenix.org/system/files/conference/woot15/woot15-paper-hlauschek.pdf Exploit Mitigation Technical Description
http://twitter.com/matthew_d_green/statuses/630908726950674433 Press/Media Coverage Technical Description Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/09/20/4 Mailing List Technical Description Third Party Advisory
http://www.securityfocus.com/bid/93071 Broken Link Third Party Advisory VDB Entry
https://kcitls.org Exploit Technical Description
https://security.netapp.com/advisory/ntap-20180626-0002/ Third Party Advisory
https://www.usenix.org/system/files/conference/woot15/woot15-paper-hlauschek.pdf Exploit Mitigation Technical Description
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:ietf:transport_layer_security:*:*:*:*:*:*:*:*
OR cpe:2.3:a:apple:safari:-:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:-:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:host_agent:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:smi-s_provider:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapdrive:-:*:*:*:*:unix:*:*
cpe:2.3:a:netapp:snapdrive:-:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
cpe:2.3:a:netapp:snapprotect:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:solidfire_\&_hci_management_node:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:system_setup:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:39

Type Values Removed Values Added
References () http://twitter.com/matthew_d_green/statuses/630908726950674433 - Press/Media Coverage, Technical Description, Third Party Advisory () http://twitter.com/matthew_d_green/statuses/630908726950674433 - Press/Media Coverage, Technical Description, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/09/20/4 - Mailing List, Technical Description, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/09/20/4 - Mailing List, Technical Description, Third Party Advisory
References () http://www.securityfocus.com/bid/93071 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/93071 - Broken Link, Third Party Advisory, VDB Entry
References () https://kcitls.org - Exploit, Technical Description () https://kcitls.org - Exploit, Technical Description
References () https://security.netapp.com/advisory/ntap-20180626-0002/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20180626-0002/ - Third Party Advisory
References () https://www.usenix.org/system/files/conference/woot15/woot15-paper-hlauschek.pdf - Exploit, Mitigation, Technical Description () https://www.usenix.org/system/files/conference/woot15/woot15-paper-hlauschek.pdf - Exploit, Mitigation, Technical Description

Information

Published : 2016-09-21 02:59

Updated : 2025-04-12 10:46


NVD link : CVE-2015-8960

Mitre link : CVE-2015-8960

CVE.ORG link : CVE-2015-8960


JSON object : View

Products Affected

netapp

  • snapdrive
  • smi-s_provider
  • clustered_data_ontap_antivirus_connector
  • oncommand_shift
  • solidfire_\&_hci_management_node
  • host_agent
  • snapmanager
  • snap_creator_framework
  • snapprotect
  • data_ontap_edge
  • plug-in_for_symantec_netbackup
  • system_setup

microsoft

  • internet_explorer

ietf

  • transport_layer_security

opera

  • opera_browser

google

  • chrome

apple

  • safari

mozilla

  • firefox
CWE
CWE-295

Improper Certificate Validation