CVE-2015-2318

HIGH

Mono < 3.12.1 - Improper Certificate Validation

Title source: rule
STIX 2.1

Description

The TLS stack in Mono before 3.12.1 allows man-in-the-middle attackers to conduct message skipping attacks and consequently impersonate clients by leveraging missing handshake state validation, aka a "SMACK SKIP-TLS" issue.

References (8)

Core 8
Core References
Third Party Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2547-1
Third Party Advisory x_refsource_misc
https://mitls.org/pages/attacks/SMACK#skip
Issue Tracking, Third Party Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1202869
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/73253
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2015/03/17/9
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2015/dsa-3202

Scores

CVSS v3 8.1
EPSS 0.0129
EPSS Percentile 79.8%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-295
Status published
Products (2)
debian/debian_linux 6.0
mono-project/mono < 3.12.1
Published Jan 08, 2018
Tracked Since Feb 18, 2026