Description
The TLS stack in Mono before 3.12.1 allows remote attackers to have unspecified impact via vectors related to client-side SSLv2 fallback.
References (7)
Core 7
Core References
Third Party Advisory vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2547-1
Issue Tracking, Third Party Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1202869
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/73256
Third Party Advisory x_refsource_confirm
https://github.com/mono/mono/commit/b371da6b2d68b4cdd0f21d6342af6c42794f998b
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2015/03/17/9
Vendor Advisory x_refsource_confirm
http://www.mono-project.com/news/2015/03/07/mono-tls-vulnerability/
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2015/dsa-3202
Scores
CVSS v3
9.8
EPSS
0.0483
EPSS Percentile
89.6%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-295
Status
published
Products (2)
debian/debian_linux
7.0
mono-project/mono
< 3.12.1
Published
Jan 08, 2018
Tracked Since
Feb 18, 2026