oss-sec mailing list archives
Re: CVE-2015-4000 - TLS does not properly convey server's ciphersuite choice
From: Yves-Alexis Perez <corsac () debian org>
Date: Wed, 20 May 2015 22:02:39 +0200
On mer., 2015-05-20 at 14:29 -0400, cve-assign () mitre org wrote:
1. Use of a common group obtained from a third party was not a choice that would have been anticipated to be unreasonable. 2. Avoiding use of a common group is not really equivalent to correcting a software mistake; it could typically involve improving a software product by adding new functionality or documentation, such as adding a call to "openssl dhparam" at installation time. 3. Existence of a common group across different customers' deployments of a product is not independently exploitable; there is no attack that depends exclusively on knowing the group used by a victim.
In some cases (IKEv2 for example), using different parameters is not possible (or really unpractical): standards groups are defined in RFC3526. -- Yves-Alexis
Attachment:
signature.asc
Description: This is a digitally signed message part
Current thread:
- CVE-2015-4000 - TLS does not properly convey server's ciphersuite choice cve-assign (May 20)
- Re: CVE-2015-4000 - TLS does not properly convey server's ciphersuite choice Yves-Alexis Perez (May 20)
- Re: CVE-2015-4000 - TLS does not properly convey server's ciphersuite choice Florian Weimer (May 26)