Description
The TLS protocol 1.2 and earlier supports the rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh, and ecdsa_fixed_ecdh values for ClientCertificateType but does not directly document the ability to compute the master secret in certain situations with a client secret key and server public key but not a server secret key, which makes it easier for man-in-the-middle attackers to spoof TLS servers by leveraging knowledge of the secret key for an arbitrary installed client X.509 certificate, aka the "Key Compromise Impersonation (KCI)" issue.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2015-8816 | The TLS protocol 1.2 and earlier supports the rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh, and ecdsa_fixed_ecdh values for ClientCertificateType but does not directly document the ability to compute the master secret in certain situations with a client secret key and server public key but not a server secret key, which makes it easier for man-in-the-middle attackers to spoof TLS servers by leveraging knowledge of the secret key for an arbitrary installed client X.509 certificate, aka the "Key Compromise Impersonation (KCI)" issue. |
References
History
No history.
Subscriptions
Apple
Subscribe
Safari
Subscribe
Google
Subscribe
Chrome
Subscribe
Ietf
Subscribe
Transport Layer Security
Subscribe
Microsoft
Subscribe
Internet Explorer
Subscribe
Mozilla
Subscribe
Firefox
Subscribe
Netapp
Subscribe
Clustered Data Ontap Antivirus Connector
Subscribe
Data Ontap Edge
Subscribe
Host Agent
Subscribe
Oncommand Shift
Subscribe
Plug-in For Symantec Netbackup
Subscribe
Smi-s Provider
Subscribe
Snap Creator Framework
Subscribe
Snapdrive
Subscribe
Snapmanager
Subscribe
Snapprotect
Subscribe
Solidfire \& Hci Management Node
Subscribe
System Setup
Subscribe
Opera
Subscribe
Opera Browser
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T08:36:30.681Z
Reserved: 2016-09-20T00:00:00.000Z
Link: CVE-2015-8960
No data.
Status : Deferred
Published: 2016-09-21T02:59:00.133
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-8960
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD