4.3
CVSSv2

CVE-2015-4000

Published: 21/05/2015 Updated: 09/02/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 3.7 | Impact Score: 1.4 | Exploitability Score: 2.2
VMScore: 446
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The TLS protocol 1.2 and previous versions, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle malicious users to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl

canonical ubuntu linux 12.04

canonical ubuntu linux 14.10

canonical ubuntu linux 14.04

canonical ubuntu linux 15.04

hp hp-ux b.11.31

ibm content manager 8.5

oracle jrockit r28.3.6

debian debian linux 8.0

debian debian linux 7.0

oracle jdk 1.8.0

oracle jre 1.7.0

oracle jre 1.6.0

oracle jre 1.8.0

oracle jdk 1.7.0

oracle jdk 1.6.0

suse linux enterprise server 11.0

suse linux enterprise software development kit 12

suse linux enterprise desktop 12

suse suse linux enterprise server 12

apple mac os x

apple iphone os

mozilla network security services 3.19

oracle sparc-opl service processor

opera opera browser -

microsoft internet explorer -

google chrome -

mozilla firefox -

apple safari -

mozilla firefox esr 38.1.0

mozilla seamonkey 2.35

mozilla thunderbird 38.1

mozilla thunderbird 31.8

mozilla firefox os 2.2

mozilla firefox 39.0

mozilla firefox esr 31.8

Vendor Advisories

Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Several security issues were fixed in Thunderbird ...
Several security issues were fixed in OpenJDK 6 ...
Several security issues were fixed in OpenJDK 7 ...
Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in the execution of arbitrary code, breakouts of the Java sandbox, information disclosure, denial of service or insecure cryptography For the oldstable distribution (wheezy), these problems have been fixed in version 6b36-1138-1~deb7 ...
Several vulnerabilities were discovered in NSS, the cryptography library developed by the Mozilla project CVE-2015-4000 David Adrian et al reported that it may be feasible to attack Diffie-Hellman-based cipher suites in certain circumstances, compromising the confidentiality and integrity of data encrypted with Transport Layer Se ...
Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, use-after-frees and other implementation errors may lead to the execution of arbitrary code or denial of service This update also addresses a vulnerability in DHE key processing commonly known as the LogJam vul ...
Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in the execution of arbitrary code, breakouts of the Java sandbox, information disclosure, denial of service or insecure cryptography For the oldstable distribution (wheezy), these problems have been fixed in version 7u79-256-1~deb7u ...
Mozilla Foundation Security Advisory 2015-70 NSS accepts export-length DHE keys with regular DHE cipher suites Announced July 2, 2015 Reporter Matthew Green, authors of the paper Impact Moderate Products Firefox, Firefox ESR ...
Multiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI components in OpenJDK An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions (CVE-2015-4760, CVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733) A flaw was found in the way the Libraries component of OpenJDK ve ...
A flaw was found in the way the TLS protocol composes the Diffie-Hellman (DH) key exchange A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic (CVE-2015-4000) Please note that this update forces the TLS/SSL client implementation in NSS to ...
LOGJAM: A flaw was found in the way the TLS protocol composes the Diffie-Hellman exchange (for both export and non-export grade cipher suites) An attacker could use this flaw to downgrade a DHE connection to use export-grade key sizes, which could then be broken by sufficient pre-computation This can lead to a passive man-in-the-middle attack in ...
Multiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI components in OpenJDK An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions (CVE-2015-4760, CVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733) A flaw was found in the way the Libraries component of OpenJDK ve ...
Multiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI components in OpenJDK An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions (CVE-2015-4760, CVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733) A flaw was found in the way the Libraries component of OpenJDK ve ...
Overview A TLS protocol vulnerability has been recently disclosed that could result in attackers being able to intercept and modify SSL/TLS encrypted traffic to servers that support Diffie-Hellman based export cipher suites  This vulnerability is known as 'LogJam' and has been assigned the following CVE number: CVE-2015-4000: cvemitre ...
Description of Problem A number of security vulnerabilities have been identified in firmware used in the Lights Out Management (LOM) component across all NetScaler-based hardware appliances: Citrix NetScaler Application Delivery Controller (ADC) Citrix NetScaler Gateway Citrix NetScaler Service Delivery Appliance Citrix CloudBridge (now NetScaler S ...

Nmap Scripts

ssl-dh-params

Weak ephemeral Diffie-Hellman parameter detection for SSL/TLS services.

nmap --script ssl-dh-params <target>

Host script results: | ssl-dh-params: | VULNERABLE: | Transport Layer Security (TLS) Protocol DHE_EXPORT Ciphers Downgrade MitM (Logjam) | State: VULNERABLE | IDs: OSVDB:122331 CVE:CVE-2015-4000 | The Transport Layer Security (TLS) protocol contains a flaw that is triggered | when handling Diffie-Hellman key exchanges defined with the DHE_EXPORT cipher. | This may allow a man-in-the-middle attacker to downgrade the security of a TLS | session to 512-bit export-grade cryptography, which is significantly weaker, | allowing the attacker to more easily break the encryption and monitor or tamper | with the encrypted stream. | Disclosure date: 2015-5-19 | Check results: | EXPORT-GRADE DH GROUP 1 | Ciphersuite: TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA | Modulus Type: Non-safe prime | Modulus Source: sun.security.provider/512-bit DSA group with 160-bit prime order subgroup | Modulus Length: 512 bits | Generator Length: 512 bits | Public Key Length: 512 bits | References: | https://weakdh.org | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000 | http://osvdb.org/122331 | | Diffie-Hellman Key Exchange Insufficient Diffie-Hellman Group Strength | State: VULNERABLE | Transport Layer Security (TLS) services that use Diffie-Hellman groups of | insuffficient strength, especially those using one of a few commonly shared | groups, may be susceptible to passive eavesdropping attacks. | Check results: | WEAK DH GROUP 1 | Ciphersuite: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA | Modulus Type: Safe prime | Modulus Source: Unknown/Custom-generated | Modulus Length: 512 bits | Generator Length: 8 bits | Public Key Length: 512 bits | References: | https://weakdh.org | | Diffie-Hellman Key Exchange Potentially Unsafe Group Parameters | State: VULNERABLE | This TLS service appears to be using a modulus that is not a safe prime and does | not correspond to any well-known DSA group for Diffie-Hellman key exchange. | These parameters MAY be secure if: | - They were generated according to the procedure described in FIPS 186-4 for | DSA Domain Parameter Generation, or | - The generator g generates a subgroup of large prime order | Additional testing may be required to verify the security of these parameters. | Check results: | NON-SAFE DH GROUP 1 | Cipher Suite: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA | Modulus Type: Non-safe prime | Modulus Source: Unknown/Custom-generated | Modulus Length: 1024 bits | Generator Length: 1024 bits | Public Key Length: 1024 bits | References: | https://weakdh.org |_ http://www2.esentire.com/TLSUnjammedWP

Github Repositories

📝 My(A) curated list of goodies.

All sorts of stuff My(A) curated list of goodies The stuff you are actually looking for: Table of contents Bookmarks Books Browsers CAPTCHA Chat Color CMS CSS Digests Donations Email Fonts GIT Icons JavaScript Lessons Localization PHP Regular expressions RESTful API Russian spelling QR Codes Security SEO Social Testing Text editors Textures, patterns, backgrounds Utils Vi

eSentire additions to the nmap network scanner

Weak ephemeral Diffie-Hellman parameter detection for SSL/TLS services This script simulates SSL/TLS handshakes using ciphersuites that have ephemeral Diffie-Hellman as the key exchange algorithm Diffie-Hellman MODP group parameters are extracted and analyzed for vulnerability to Logjam (CVE 2015-4000) and other weaknesses Opportunistic STARTTLS sessions are established on s

✨ HAProxy ve Keepalived konusunu load balancer ve cluster'a ek olarak güvenlik(zayıf SSL/Kripto Kullanımı (LOGJAM) (CVE-2015-4000) zafiyeti önlemi) ve yüksek yüklere karşı ele alır.

HAProxy ve Keepalived (LoadBalancer+Cluster+Sec+HighLoads) Kurulum ve Yapılandırması HAProxy, yüksek erişilebilirliğe(high availability) sahip yük dengeleyici(load balancing) ile TCP ve HTTP tabanlı uygulamalar için proxy sunucusu hizmeti veren açık kaynak kodlu bir yazılımdır Keepalived, IP failover(yük devretme) yeteneğini ikiden dah

Домашнее задание "Уязвимости и атаки на информационные системы" - Подус Сергей Задание 1 Скачайте и установите виртуальную машину Metasploitable: sourceforgenet/projects/metasploitable/ Это типовая ОС для экспериментов в о

Recent Articles

OpenSSL releases seven patches for seven vulns
The Register • Darren Pauli • 12 Jun 2015

Flood of fixes to clear LogJam flaw

Users are being urged to upgrade OpenSSL to prevent eavesdroppers listening to otherwise encrypted connections undermined through the LogJam vulnerability thought to be the NSA's crypto-cracking tool of choice. OpenSSL maintainers have patched seven vulnerabilities including the LogJam vulnerability (CVE-2015-4000) which allows attackers to trick browsers into considering an insecure encrypted connection as secure. "A vulnerability in the TLS protocol allows a man-in-the-middle attacker to downg...

References

CWE-310https://weakdh.org/imperfect-forward-secrecy.pdfhttps://weakdh.org/https://www.suse.com/security/cve/CVE-2015-4000.htmlhttps://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/http://openwall.com/lists/oss-security/2015/05/20/8http://www.securityfocus.com/bid/74733https://www.openssl.org/news/secadv_20150611.txthttp://lists.apple.com/archives/security-announce/2015/Jun/msg00002.htmlhttp://lists.apple.com/archives/security-announce/2015/Jun/msg00001.htmlhttp://support.apple.com/kb/HT204941http://support.apple.com/kb/HT204942http://www.mozilla.org/security/announce/2015/mfsa2015-70.htmlhttps://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.1_release_noteshttps://bugzilla.mozilla.org/show_bug.cgi?id=1138554http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.htmlhttp://www.securitytracker.com/id/1033064http://www-01.ibm.com/support/docview.wss?uid=swg21962455http://www.debian.org/security/2015/dsa-3324http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.htmlhttp://www.ubuntu.com/usn/USN-2673-1http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.htmlhttp://marc.info/?l=bugtraq&m=143880121627664&w=2http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.htmlhttp://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlhttp://www.solarwinds.com/documentation/storage/storagemanager/docs/ReleaseNotes/releaseNotes.htmhttp://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128722http://www.securityfocus.com/bid/91787https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193083https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763http://marc.info/?l=bugtraq&m=145409266329539&w=2https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04953655https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04740527http://marc.info/?l=bugtraq&m=144060576831314&w=2http://marc.info/?l=bugtraq&m=144069189622016&w=2http://marc.info/?l=bugtraq&m=144493176821532&w=2http://marc.info/?l=bugtraq&m=143637549705650&w=2http://marc.info/?l=bugtraq&m=144061542602287&w=2http://marc.info/?l=bugtraq&m=143557934009303&w=2http://marc.info/?l=bugtraq&m=143628304012255&w=2http://marc.info/?l=bugtraq&m=144104533800819&w=2http://marc.info/?l=bugtraq&m=144060606031437&w=2http://marc.info/?l=bugtraq&m=143558092609708&w=2http://marc.info/?l=bugtraq&m=143655800220052&w=2http://marc.info/?l=bugtraq&m=143506486712441&w=2http://marc.info/?l=bugtraq&m=144102017024820&w=2http://marc.info/?l=bugtraq&m=144043644216842&w=2http://marc.info/?l=bugtraq&m=144050121701297&w=2http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.htmlhttp://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgeryhttp://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727https://openssl.org/news/secadv/20150611.txthttps://security.gentoo.org/glsa/201603-11http://lists.opensuse.org/opensuse-updates/2016-02/msg00097.htmlhttp://www.securitytracker.com/id/1034884http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04949778http://lists.opensuse.org/opensuse-updates/2016-02/msg00094.htmlhttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923929http://www-304.ibm.com/support/docview.wss?uid=swg21967893https://security.gentoo.org/glsa/201512-10http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.htmlhttp://www.securitytracker.com/id/1034728http://www.securitytracker.com/id/1034087http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.htmlhttp://www.securitytracker.com/id/1033991https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04918839https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.htmlhttp://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04876402https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.htmlhttp://www-304.ibm.com/support/docview.wss?uid=swg21960041https://bto.bluecoat.com/security-advisory/sa98http://www.securitytracker.com/id/1033760http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.htmlhttps://security.gentoo.org/glsa/201506-02https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140http://www-01.ibm.com/support/docview.wss?uid=swg21959111http://www.securitytracker.com/id/1033513http://www.securitytracker.com/id/1033433http://www.securitytracker.com/id/1033430http://www.securitytracker.com/id/1033416http://www.securitytracker.com/id/1033385http://www.fortiguard.com/advisory/2015-05-20-logjam-attackhttp://support.citrix.com/article/CTX201114http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.htmlhttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241http://www-304.ibm.com/support/docview.wss?uid=swg21962816http://www-01.ibm.com/support/docview.wss?uid=swg21962739http://www-01.ibm.com/support/docview.wss?uid=swg21960191http://www.ubuntu.com/usn/USN-2706-1http://www.ubuntu.com/usn/USN-2696-1http://www.securitytracker.com/id/1033891http://www.securitytracker.com/id/1033341http://www.securitytracker.com/id/1033222http://www.securitytracker.com/id/1033210http://www.securitytracker.com/id/1033209http://www.securitytracker.com/id/1033208http://www.debian.org/security/2015/dsa-3339http://rhn.redhat.com/errata/RHSA-2015-1526.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.htmlhttp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.aschttp://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.aschttps://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098403https://www-304.ibm.com/support/docview.wss?uid=swg21959745https://kc.mcafee.com/corporate/index?page=content&id=SB10122http://www-304.ibm.com/support/docview.wss?uid=swg21960418http://www-304.ibm.com/support/docview.wss?uid=swg21960380http://www-304.ibm.com/support/docview.wss?uid=swg21960194http://www-304.ibm.com/support/docview.wss?uid=swg21959132http://www-304.ibm.com/support/docview.wss?uid=swg21958984http://www-01.ibm.com/support/docview.wss?uid=swg21961717http://www-01.ibm.com/support/docview.wss?uid=swg21959812http://www-01.ibm.com/support/docview.wss?uid=swg21959636http://www-01.ibm.com/support/docview.wss?uid=swg21959539http://www-01.ibm.com/support/docview.wss?uid=swg21959530http://www-01.ibm.com/support/docview.wss?uid=swg21959517http://www-01.ibm.com/support/docview.wss?uid=swg21959481http://www-01.ibm.com/support/docview.wss?uid=swg21959453http://www-01.ibm.com/support/docview.wss?uid=swg21959325http://www-01.ibm.com/support/docview.wss?uid=swg21959195http://www.ubuntu.com/usn/USN-2656-2http://www.ubuntu.com/usn/USN-2656-1http://www.securitytracker.com/id/1032884http://www.securitytracker.com/id/1032871http://www.securitytracker.com/id/1032865http://www.securitytracker.com/id/1032864http://www.securitytracker.com/id/1032856http://www.securitytracker.com/id/1032784http://www.securitytracker.com/id/1032783http://www.securitytracker.com/id/1032778http://www.securitytracker.com/id/1032777http://www.securitytracker.com/id/1032759http://www.securitytracker.com/id/1032727http://www.securitytracker.com/id/1032702http://www.securitytracker.com/id/1032699http://www.securitytracker.com/id/1032688http://www.securitytracker.com/id/1032656http://www.securitytracker.com/id/1032655http://www.securitytracker.com/id/1032654http://www.securitytracker.com/id/1032653http://www.securitytracker.com/id/1032652http://www.securitytracker.com/id/1032651http://www.securitytracker.com/id/1032650http://www.securitytracker.com/id/1032649http://www.securitytracker.com/id/1032648http://www.securitytracker.com/id/1032647http://www.securitytracker.com/id/1032645http://www.securitytracker.com/id/1032637http://www.debian.org/security/2015/dsa-3300http://lists.opensuse.org/opensuse-updates/2015-07/msg00016.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.htmlhttp://www.securitytracker.com/id/1032476http://www.securitytracker.com/id/1032475http://www.securitytracker.com/id/1032474http://www.debian.org/security/2015/dsa-3287http://rhn.redhat.com/errata/RHSA-2015-1197.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1072.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2015-June/160117.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2015-June/159351.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2015-June/159314.htmlhttp://kb.juniper.net/InfoCenter/index?page=content&id=JSA10681https://security.gentoo.org/glsa/201701-46http://www.securitytracker.com/id/1036218http://www.securitytracker.com/id/1033067http://www.securitytracker.com/id/1033065http://www.securitytracker.com/id/1033019http://www.securitytracker.com/id/1032960http://www.securitytracker.com/id/1032932http://www.securitytracker.com/id/1032910http://www.debian.org/security/2016/dsa-3688http://www.debian.org/security/2015/dsa-3316https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04718196https://security.netapp.com/advisory/ntap-20150619-0001/https://support.citrix.com/article/CTX216642https://puppet.com/security/cve/CVE-2015-4000http://rhn.redhat.com/errata/RHSA-2016-2056.htmlhttp://rhn.redhat.com/errata/RHSA-2016-1624.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1604.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1544.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1488.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1486.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1485.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1243.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1242.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1241.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1230.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1229.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1228.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1185.htmlhttp://www.securitytracker.com/id/1040630https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03831en_ushttps://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixeshttps://www.oracle.com/security-alerts/cpujan2021.htmlhttps://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdfhttps://nvd.nist.govhttps://github.com/thekondrashov/stuffhttps://usn.ubuntu.com/2656-1/https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-21