6.8
CVSSv2

CVE-2015-2318

Published: 08/01/2018 Updated: 30/01/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

The TLS stack in Mono prior to 3.12.1 allows man-in-the-middle malicious users to conduct message skipping attacks and consequently impersonate clients by leveraging missing handshake state validation, aka a "SMACK SKIP-TLS" issue.

Vulnerable Product Search on Vulmon Subscribe to Product

mono-project mono

debian debian linux 6.0

Vendor Advisories

Debian Bug report logs - #780751 mono: CVE-2015-2318 CVE-2015-2319 CVE-2015-2320 Package: src:mono; Maintainer for src:mono is Debian Mono Group <pkg-mono-group@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 18 Mar 2015 19:27:01 UTC Severity: grave Tags: fixed-upstream, sec ...
Several security issues were fixed in Mono ...
Researchers at INRIA and Xamarin discovered several vulnerabilities in mono, a platform for running and developing applications based on the ECMA/ISO Standards Mono's TLS stack contained several problems that hampered its capabilities: those issues could lead to client impersonation (via SKIP-TLS), SSLv2 fallback, and encryption weakening (via FRE ...