CVE-2015-3152
Severity CVSS v4.0:
Pending analysis
Type:
CWE-295
Improper Certificate Validation
Publication date:
16/05/2016
Last modified:
12/04/2025
Description
Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a "BACKRONYM" attack.
Impact
Base Score 3.x
5.90
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* | 5.7.2 (including) | |
| cpe:2.3:a:oracle:mysql_connector\/c:*:*:*:*:*:*:*:* | 6.1.2 (including) | |
| cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* | 5.5.0 (including) | 5.5.44 (excluding) |
| cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* | 10.0.0 (including) | 10.0.20 (excluding) |
| cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161436.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161625.html
- http://mysqlblog.fivefarmers.com/2014/04/02/redefining-ssl-option/
- http://mysqlblog.fivefarmers.com/2015/04/29/ssltls-in-5-6-and-5-5-ocert-advisory/
- http://packetstormsecurity.com/files/131688/MySQL-SSL-TLS-Downgrade.html
- http://rhn.redhat.com/errata/RHSA-2015-1646.html
- http://rhn.redhat.com/errata/RHSA-2015-1647.html
- http://rhn.redhat.com/errata/RHSA-2015-1665.html
- http://www.debian.org/security/2015/dsa-3311
- http://www.ocert.org/advisories/ocert-2015-003.html
- http://www.securityfocus.com/archive/1/535397/100/1100/threaded
- http://www.securityfocus.com/bid/74398
- http://www.securitytracker.com/id/1032216
- https://access.redhat.com/security/cve/cve-2015-3152
- https://github.com/mysql/mysql-server/commit/3bd5589e1a5a93f9c224badf983cd65c45215390
- https://jira.mariadb.org/browse/MDEV-7937
- https://www.duosecurity.com/blog/backronym-mysql-vulnerability
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161436.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161625.html
- http://mysqlblog.fivefarmers.com/2014/04/02/redefining-ssl-option/
- http://mysqlblog.fivefarmers.com/2015/04/29/ssltls-in-5-6-and-5-5-ocert-advisory/
- http://packetstormsecurity.com/files/131688/MySQL-SSL-TLS-Downgrade.html
- http://rhn.redhat.com/errata/RHSA-2015-1646.html
- http://rhn.redhat.com/errata/RHSA-2015-1647.html
- http://rhn.redhat.com/errata/RHSA-2015-1665.html
- http://www.debian.org/security/2015/dsa-3311
- http://www.ocert.org/advisories/ocert-2015-003.html
- http://www.securityfocus.com/archive/1/535397/100/1100/threaded
- http://www.securityfocus.com/bid/74398
- http://www.securitytracker.com/id/1032216
- https://access.redhat.com/security/cve/cve-2015-3152
- https://github.com/mysql/mysql-server/commit/3bd5589e1a5a93f9c224badf983cd65c45215390
- https://jira.mariadb.org/browse/MDEV-7937
- https://www.duosecurity.com/blog/backronym-mysql-vulnerability



