7.5
CVSSv2

CVE-2015-5244

Published: 07/08/2017 Updated: 16/08/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The NSSCipherSuite option with ciphersuites enabled in mod_nss prior to 1.0.12 allows remote malicious users to bypass application restrictions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mod nss project mod nss

Vendor Advisories

Debian Bug report logs - #799464 libapache2-mod-nss: CVE-2015-5244: incorrect ciphersuite parsing Package: src:libapache2-mod-nss; Maintainer for src:libapache2-mod-nss is Debian 389ds Team <pkg-fedora-ds-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 19 Sep 2015 ...
It was found that the parsing of the NSSCipherSuite option of mod24_nss, which accepts OpenSSL-style cipherstrings, is flawed If the option is used to disable insecure ciphersuites using the common "!" syntax, it will actually enable those insecure ciphersuites (CVE-2015-5244) ...