7.5
CVSSv3

CVE-2015-3276

Published: 07/12/2015 Updated: 28/04/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote malicious users to have unspecified impact via unknown vectors.

Vulnerable Product Search on Vulmon Subscribe to Product

openldap openldap

oracle linux 7

redhat enterprise linux desktop 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

redhat enterprise linux hpc node 7.0

redhat enterprise linux server tus 7.3

redhat enterprise linux server aus 7.3

redhat enterprise linux server aus 7.4

redhat enterprise linux eus 7.3

redhat enterprise linux eus 7.4

redhat enterprise linux eus 7.5

redhat enterprise linux server tus 7.6

redhat enterprise linux server aus 7.6

redhat enterprise linux eus 7.6

redhat enterprise linux server aus 7.7

redhat enterprise linux server tus 7.7

redhat enterprise linux eus 7.7

Vendor Advisories

Synopsis Moderate: openldap security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic Updated openldap packages that fix one security issue, several bugs, andadd one enhancement are now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as ...
A flaw was found in the way OpenLDAP parsed OpenSSL-style cipher strings As a result, OpenLDAP could potentially use ciphers that were not intended to be enabled ...
A flaw was found in the way OpenLDAP parsed OpenSSL-style cipher strings As a result, OpenLDAP could potentially use ciphers that were not intended to be enabled ...