Lucene search

K
ibmIBMEE42B49F4ED7989DA704E71F816F1C0267A168A58733CEB65888EB8FB4959A33
HistoryAug 09, 2018 - 4:20 a.m.

Security Bulletin: : Vulnerability in MD5 Signature and Hash Algorithm affects IBM® SDK for Node.js™ (CVE-2015-7575)

2018-08-0904:20:36
www.ibm.com
13

EPSS

0.003

Percentile

69.2%

Summary

The MD5 “SLOTH” vulnerability on TLS 1.2 affects IBM SDK for Node.js

Vulnerability Details

CVEID: CVE-2015-7575 DESCRIPTION: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials.
CVSS Base Score: 7.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/109415 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N)

Affected Products and Versions

This vulnerability affects IBM SDK for Node.js v1.1.0.2 and previous releases.

Remediation/Fixes

The fix for this vulnerability is included in IBM SDK for Node.js v1.1.0.3 and subsequent releases.

IBM SDK for Node.js can be downloaded, subject to the terms of the developerWorks license, from here.

IBM customers requiring an update for an SDK shipped with an IBM product should contact IBM support, and/or refer to the appropriate product security bulletin.