cvelist/2012/2xxx/CVE-2012-2668.json

94 lines
2.7 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2012-2668",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "libraries/libldap/tls_m.c in OpenLDAP, possibly 2.4.31 and earlier, when using the Mozilla NSS backend, always uses the default cipher suite even when TLSCipherSuite is set, which might cause OpenLDAP to use weaker ciphers than intended and make it easier for remote attackers to obtain sensitive information."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "http://www.openwall.com/lists/oss-security/2012/06/05/4"
},
{
"url" : "http://www.openwall.com/lists/oss-security/2012/06/06/1"
},
{
"url" : "http://www.openwall.com/lists/oss-security/2012/06/06/2"
},
{
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=676309"
},
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=825875"
},
{
"url" : "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commitdiff;h=2c2bb2e"
},
{
"url" : "http://www.openldap.org/its/index.cgi?findid=7285"
},
{
"url" : "http://security.gentoo.org/glsa/glsa-201406-36.xml"
},
{
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1151.html"
},
{
"url" : "http://www.securityfocus.com/bid/53823"
},
{
"url" : "http://www.securitytracker.com/id?1027127"
},
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/76099"
}
]
}
}