CVE-2015-3152
5.9MEDIUM
Key Information:
- Vendor
- Oracle
- Status
- Vendor
- CVE Published:
- 16 May 2016
Badges
πΎ Exploit Existsπ‘ Public PoC
Summary
Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a "BACKRONYM" attack.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Score:
5.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
- π‘
Public PoC available
- πΎ
Exploit known to exist
Collectors
NVD DatabaseMitre Database1 Proof of Concept(s)