Bugzilla – Bug 938571
VUL-0: CVE-2015-3278: mozilla-nss: incorrect multi-keyword mode cipherstring parsing
Last modified: 2015-07-24 14:02:13 UTC
Via RH: It was reported that cipherstring parsing code incorrectly implements the multi-keyword mode in nss_compat_ossl. As a consequence anyone using a combination like ECDH+SHA will not get the expected set of ciphers ECDH-RSA-RC4-SHA ECDH-RSA-DES-CBC3-SHA ECDH-RSA-AES128-SHA ECDH-RSA-AES256-SHA ECDH-ECDSA-RC4-SHA ECDH-ECDSA-DES-CBC3-SHA ECDH-ECDSA-AES128-SHA ECDH-ECDSA-AES256-SHA ECDHE-RSA-RC4-SHA ECDHE-RSA-DES-CBC3-SHA ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA ECDHE-ECDSA-RC4-SHA ECDHE-ECDSA-DES-CBC3-SHA ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA but instead will match DES-CBC-SHA DES-CBC3-SHA RC4-SHA EDH-RSA-DES-CBC-SHA EDH-RSA-DES-CBC3-SHA EDH-DSS-DES-CBC-SHA EDH-DSS-DES-CBC3-SHA EXP1024-DES-CBC-SHA EXP1024-RC4-SHA SEED-SHA AES128-SHA AES256-SHA CAMELLIA256-SHA CAMELLIA128-SHA DHE-RSA-AES128-SHA DHE-RSA-AES256-SHA DHE-RSA-CAMELLIA128-SHA DHE-RSA-CAMELLIA256-SHA DHE-DSS-RC4-SHA DHE-DSS-AES128-SHA DHE-DSS-AES256-SHA DHE-DSS-CAMELLIA128-SHA DHE-DSS-CAMELLIA256-SHA ECDH-RSA-RC4-SHA ECDH-RSA-DES-CBC3-SHA ECDH-RSA-AES128-SHA ECDH-RSA-AES256-SHA ECDH-ECDSA-RC4-SHA ECDH-ECDSA-DES-CBC3-SHA ECDH-ECDSA-AES128-SHA ECDH-ECDSA-AES256-SHA ECDHE-RSA-RC4-SHA ECDHE-RSA-DES-CBC3-SHA ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA ECDHE-ECDSA-RC4-SHA ECDHE-ECDSA-DES-CBC3-SHA ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA Acknowledgements: Red Hat would like to thank Martin Poole of Software Maintenance Engineering group for reporting this issue. References: https://bugzilla.redhat.com/show_bug.cgi?id=1238326 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3278 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3278 No patch is publically available at this time
bugbot adjusting priority
I do not think we use the nss -> openssl converter.