Description
The TLS stack in Mono before 3.12.1 allows man-in-the-middle attackers to conduct message skipping attacks and consequently impersonate clients by leveraging missing handshake state validation, aka a "SMACK SKIP-TLS" issue.
References (8)
Core 8
Core References
Third Party Advisory vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2547-1
Third Party Advisory x_refsource_misc
https://mitls.org/pages/attacks/SMACK#skip
Issue Tracking, Third Party Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1202869
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/73253
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2015/03/17/9
Vendor Advisory x_refsource_confirm
http://www.mono-project.com/news/2015/03/07/mono-tls-vulnerability/
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2015/dsa-3202
Third Party Advisory x_refsource_confirm
https://github.com/mono/mono/commit/1509226c41d74194c146deb173e752b8d3cdeec4
Scores
CVSS v3
8.1
EPSS
0.0129
EPSS Percentile
79.8%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-295
Status
published
Products (2)
debian/debian_linux
6.0
mono-project/mono
< 3.12.1
Published
Jan 08, 2018
Tracked Since
Feb 18, 2026