Lucene search

K
nvd[email protected]NVD:CVE-2015-0226
HistoryOct 30, 2017 - 2:29 p.m.

CVE-2015-0226

2017-10-3014:29:00
CWE-327
web.nvd.nist.gov
7

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

5.9

Confidence

High

EPSS

0.006

Percentile

79.3%

Apache WSS4J before 1.6.17 and 2.0.x before 2.0.2 improperly leaks information about decryption failures when decrypting an encrypted key or message data, which makes it easier for remote attackers to recover the plaintext form of a symmetric key via a series of crafted messages. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-2487.

Affected configurations

Nvd
Node
apachewss4jRange≀1.6.16
OR
apachewss4jMatch2.0beta
OR
apachewss4jMatch2.0.0
OR
apachewss4jMatch2.0.0rc1
OR
apachewss4jMatch2.0.1
VendorProductVersionCPE
apachewss4j*cpe:2.3:a:apache:wss4j:*:*:*:*:*:*:*:*
apachewss4j2.0cpe:2.3:a:apache:wss4j:2.0:beta:*:*:*:*:*:*
apachewss4j2.0.0cpe:2.3:a:apache:wss4j:2.0.0:*:*:*:*:*:*:*
apachewss4j2.0.0cpe:2.3:a:apache:wss4j:2.0.0:rc1:*:*:*:*:*:*
apachewss4j2.0.1cpe:2.3:a:apache:wss4j:2.0.1:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

5.9

Confidence

High

EPSS

0.006

Percentile

79.3%