First published: Wed Sep 02 2015(Updated: )
The NSSCipherSuite option of mod_nss accepts OpenSSL-styled cipherstrings. It was found that the parsing of such cipherstrings is flawed. If this option is used to disable insecure ciphersuites using the common "!" syntax, e.g.: NSSCipherSuite !eNULL:!aNULL:AESGCM+aRSA:ECDH+aRSA it will actually enable those insecure ciphersuites. Acknowledgements: This issue was discovered Hubert Kario of Red Hat.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mod Nss Project Mod Nss | <=1.0.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5244 is considered a moderate severity vulnerability due to its potential impact on the security of TLS connections.
To mitigate CVE-2015-5244, upgrade mod_nss to version 1.0.12 or later, where the cipherstring parsing flaw has been addressed.
CVE-2015-5244 affects mod_nss versions up to and including 1.0.11.
Yes, CVE-2015-5244 can be exploited remotely if the vulnerable version of mod_nss is used in an exposed web server configuration.
CVE-2015-5244 could facilitate attacks that exploit improper cipher configuration, potentially allowing an attacker to downgrade or compromise encrypted connections.