The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.

Project Subscriptions

Vendors Products
Iphone Os Subscribe
Mac Os X Subscribe
Canonical Subscribe
Ubuntu Linux Subscribe
Debian Linux Subscribe
Content Manager Subscribe
Microsoft Subscribe
Internet Explorer Subscribe
Mozilla Subscribe
Firefox Subscribe
Firefox Esr Subscribe
Firefox Os Subscribe
Network Security Services Subscribe
Seamonkey Subscribe
Thunderbird Subscribe
Openssl Subscribe
Openssl Subscribe
Opera Browser Subscribe
Jrockit Subscribe
Sparc-opl Service Processor Subscribe
Enterprise Linux Subscribe
Jboss Enterprise Application Platform Subscribe
Jboss Enterprise Web Server Subscribe
Network Satellite Subscribe
Rhel Extras Subscribe
Rhel Extras Oracle Java Subscribe
Linux Enterprise Desktop Subscribe
Linux Enterprise Server Subscribe
Linux Enterprise Software Development Kit Subscribe
Suse Linux Enterprise Server Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-247-1 openssl security update
Debian DLA Debian DLA DLA-303-1 openjdk-6 security update
Debian DLA Debian DLA DLA-507-1 nss security update
Debian DSA Debian DSA DSA-3287-1 openssl security update
Debian DSA Debian DSA DSA-3300-1 iceweasel security update
Debian DSA Debian DSA DSA-3316-1 openjdk-7 security update
Debian DSA Debian DSA DSA-3324-1 icedove security update
Debian DSA Debian DSA DSA-3339-1 openjdk-6 security update
Debian DSA Debian DSA DSA-3688-1 nss security update
Ubuntu USN Ubuntu USN USN-2656-1 Firefox vulnerabilities
Ubuntu USN Ubuntu USN USN-2656-2 Firefox vulnerabilities
Ubuntu USN Ubuntu USN USN-2673-1 Thunderbird vulnerabilities
Ubuntu USN Ubuntu USN USN-2696-1 OpenJDK 7 vulnerabilities
Ubuntu USN Ubuntu USN USN-2706-1 OpenJDK 6 vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc cve-icon cve-icon
http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery cve-icon cve-icon
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc cve-icon cve-icon
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04876402 cve-icon cve-icon
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04949778 cve-icon cve-icon
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10681 cve-icon cve-icon
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727 cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159314.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159351.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160117.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-updates/2015-07/msg00016.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-updates/2016-02/msg00094.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-updates/2016-02/msg00097.html cve-icon cve-icon
http://marc.info/?l=bugtraq&m=143506486712441&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=143557934009303&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=143558092609708&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=143628304012255&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=143637549705650&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=143655800220052&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=143880121627664&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=144043644216842&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=144050121701297&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=144060576831314&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=144060606031437&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=144061542602287&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=144069189622016&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=144102017024820&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=144104533800819&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=144493176821532&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=145409266329539&w=2 cve-icon cve-icon
http://openwall.com/lists/oss-security/2015/05/20/8 cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-1072.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-1185.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-1197.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-1228.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-1229.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-1230.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-1241.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-1242.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-1243.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-1485.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-1486.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-1488.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-1526.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-1544.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2015-1604.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-1624.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-2056.html cve-icon cve-icon
http://support.apple.com/kb/HT204941 cve-icon cve-icon
http://support.apple.com/kb/HT204942 cve-icon cve-icon
http://support.citrix.com/article/CTX201114 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21959111 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21959195 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21959325 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21959453 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21959481 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21959517 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21959530 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21959539 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21959636 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21959812 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21960191 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21961717 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21962455 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21962739 cve-icon cve-icon
http://www-304.ibm.com/support/docview.wss?uid=swg21958984 cve-icon cve-icon
http://www-304.ibm.com/support/docview.wss?uid=swg21959132 cve-icon cve-icon
http://www-304.ibm.com/support/docview.wss?uid=swg21960041 cve-icon cve-icon
http://www-304.ibm.com/support/docview.wss?uid=swg21960194 cve-icon cve-icon
http://www-304.ibm.com/support/docview.wss?uid=swg21960380 cve-icon cve-icon
http://www-304.ibm.com/support/docview.wss?uid=swg21960418 cve-icon cve-icon
http://www-304.ibm.com/support/docview.wss?uid=swg21962816 cve-icon cve-icon
http://www-304.ibm.com/support/docview.wss?uid=swg21967893 cve-icon cve-icon
http://www.debian.org/security/2015/dsa-3287 cve-icon cve-icon
http://www.debian.org/security/2015/dsa-3300 cve-icon cve-icon
http://www.debian.org/security/2015/dsa-3316 cve-icon cve-icon
http://www.debian.org/security/2015/dsa-3324 cve-icon cve-icon
http://www.debian.org/security/2015/dsa-3339 cve-icon cve-icon
http://www.debian.org/security/2016/dsa-3688 cve-icon cve-icon
http://www.fortiguard.com/advisory/2015-05-20-logjam-attack cve-icon cve-icon
http://www.mozilla.org/security/announce/2015/mfsa2015-70.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html cve-icon cve-icon
http://www.securityfocus.com/bid/74733 cve-icon cve-icon
http://www.securityfocus.com/bid/91787 cve-icon cve-icon
http://www.securitytracker.com/id/1032474 cve-icon cve-icon
http://www.securitytracker.com/id/1032475 cve-icon cve-icon
http://www.securitytracker.com/id/1032476 cve-icon cve-icon
http://www.securitytracker.com/id/1032637 cve-icon cve-icon
http://www.securitytracker.com/id/1032645 cve-icon cve-icon
http://www.securitytracker.com/id/1032647 cve-icon cve-icon
http://www.securitytracker.com/id/1032648 cve-icon cve-icon
http://www.securitytracker.com/id/1032649 cve-icon cve-icon
http://www.securitytracker.com/id/1032650 cve-icon cve-icon
http://www.securitytracker.com/id/1032651 cve-icon cve-icon
http://www.securitytracker.com/id/1032652 cve-icon cve-icon
http://www.securitytracker.com/id/1032653 cve-icon cve-icon
http://www.securitytracker.com/id/1032654 cve-icon cve-icon
http://www.securitytracker.com/id/1032655 cve-icon cve-icon
http://www.securitytracker.com/id/1032656 cve-icon cve-icon
http://www.securitytracker.com/id/1032688 cve-icon cve-icon
http://www.securitytracker.com/id/1032699 cve-icon cve-icon
http://www.securitytracker.com/id/1032702 cve-icon cve-icon
http://www.securitytracker.com/id/1032727 cve-icon cve-icon
http://www.securitytracker.com/id/1032759 cve-icon cve-icon
http://www.securitytracker.com/id/1032777 cve-icon cve-icon
http://www.securitytracker.com/id/1032778 cve-icon cve-icon
http://www.securitytracker.com/id/1032783 cve-icon cve-icon
http://www.securitytracker.com/id/1032784 cve-icon cve-icon
http://www.securitytracker.com/id/1032856 cve-icon cve-icon
http://www.securitytracker.com/id/1032864 cve-icon cve-icon
http://www.securitytracker.com/id/1032865 cve-icon cve-icon
http://www.securitytracker.com/id/1032871 cve-icon cve-icon
http://www.securitytracker.com/id/1032884 cve-icon cve-icon
http://www.securitytracker.com/id/1032910 cve-icon cve-icon
http://www.securitytracker.com/id/1032932 cve-icon cve-icon
http://www.securitytracker.com/id/1032960 cve-icon cve-icon
http://www.securitytracker.com/id/1033019 cve-icon cve-icon
http://www.securitytracker.com/id/1033064 cve-icon cve-icon
http://www.securitytracker.com/id/1033065 cve-icon cve-icon
http://www.securitytracker.com/id/1033067 cve-icon cve-icon
http://www.securitytracker.com/id/1033208 cve-icon cve-icon
http://www.securitytracker.com/id/1033209 cve-icon cve-icon
http://www.securitytracker.com/id/1033210 cve-icon cve-icon
http://www.securitytracker.com/id/1033222 cve-icon cve-icon
http://www.securitytracker.com/id/1033341 cve-icon cve-icon
http://www.securitytracker.com/id/1033385 cve-icon cve-icon
http://www.securitytracker.com/id/1033416 cve-icon cve-icon
http://www.securitytracker.com/id/1033430 cve-icon cve-icon
http://www.securitytracker.com/id/1033433 cve-icon cve-icon
http://www.securitytracker.com/id/1033513 cve-icon cve-icon
http://www.securitytracker.com/id/1033760 cve-icon cve-icon
http://www.securitytracker.com/id/1033891 cve-icon cve-icon
http://www.securitytracker.com/id/1033991 cve-icon cve-icon
http://www.securitytracker.com/id/1034087 cve-icon cve-icon
http://www.securitytracker.com/id/1034728 cve-icon cve-icon
http://www.securitytracker.com/id/1034884 cve-icon cve-icon
http://www.securitytracker.com/id/1036218 cve-icon cve-icon
http://www.securitytracker.com/id/1040630 cve-icon cve-icon
http://www.solarwinds.com/documentation/storage/storagemanager/docs/ReleaseNotes/releaseNotes.htm cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2656-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2656-2 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2673-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2696-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2706-1 cve-icon cve-icon
https://access.redhat.com/articles/1456263 cve-icon
https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/ cve-icon cve-icon
https://bto.bluecoat.com/security-advisory/sa98 cve-icon cve-icon
https://bugzilla.mozilla.org/show_bug.cgi?id=1138554 cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf cve-icon cve-icon
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.1_release_notes cve-icon cve-icon
https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04718196 cve-icon cve-icon
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140 cve-icon cve-icon
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190 cve-icon cve-icon
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119 cve-icon cve-icon
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241 cve-icon cve-icon
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 cve-icon cve-icon
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04918839 cve-icon cve-icon
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923929 cve-icon cve-icon
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04740527 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04953655 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128722 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193083 cve-icon cve-icon
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes cve-icon cve-icon
https://kc.mcafee.com/corporate/index?page=content&id=SB10122 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2015-4000 cve-icon
https://openssl.org/news/secadv/20150611.txt cve-icon cve-icon
https://puppet.com/security/cve/CVE-2015-4000 cve-icon cve-icon
https://security.gentoo.org/glsa/201506-02 cve-icon cve-icon
https://security.gentoo.org/glsa/201512-10 cve-icon cve-icon
https://security.gentoo.org/glsa/201603-11 cve-icon cve-icon
https://security.gentoo.org/glsa/201701-46 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20150619-0001/ cve-icon cve-icon
https://support.citrix.com/article/CTX216642 cve-icon cve-icon
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03831en_us cve-icon cve-icon
https://weakdh.org/ cve-icon cve-icon cve-icon
https://weakdh.org/imperfect-forward-secrecy.pdf cve-icon cve-icon
https://www-304.ibm.com/support/docview.wss?uid=swg21959745 cve-icon cve-icon
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098403 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2015-4000 cve-icon
https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/ cve-icon cve-icon
https://www.openssl.org/news/secadv_20150611.txt cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2021.html cve-icon cve-icon
https://www.suse.com/security/cve/CVE-2015-4000.html cve-icon cve-icon
History

Tue, 22 Oct 2024 14:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:mozilla:firefox_esr:38.1.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T06:04:02.725Z

Reserved: 2015-05-15T00:00:00.000Z

Link: CVE-2015-4000

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-05-21T00:59:00.087

Modified: 2025-04-12T10:46:40.837

Link: CVE-2015-4000

cve-icon Redhat

Severity : Moderate

Publid Date: 2015-05-20T00:00:00Z

Links: CVE-2015-4000 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses