Medium severity5.9NVD Advisory· Published May 16, 2016· Updated May 6, 2026
CVE-2015-3152
CVE-2015-3152
Description
Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a "BACKRONYM" attack.
Affected products
24- cpe:2.3:a:oracle:mysql_connector\/c:*:*:*:*:*:*:*:*Range: <=6.1.2
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*+ 6 more
- cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
17- github.com/mysql/mysql-server/commit/3bd5589e1a5a93f9c224badf983cd65c45215390nvdPatchThird Party Advisory
- mysqlblog.fivefarmers.com/2014/04/02/redefining-ssl-option/nvdExploitThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-July/161436.htmlnvdMailing ListThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-July/161625.htmlnvdMailing ListThird Party Advisory
- mysqlblog.fivefarmers.com/2015/04/29/ssltls-in-5-6-and-5-5-ocert-advisory/nvdThird Party Advisory
- packetstormsecurity.com/files/131688/MySQL-SSL-TLS-Downgrade.htmlnvdThird Party AdvisoryVDB Entry
- rhn.redhat.com/errata/RHSA-2015-1646.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1647.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1665.htmlnvdThird Party Advisory
- www.debian.org/security/2015/dsa-3311nvdThird Party Advisory
- www.ocert.org/advisories/ocert-2015-003.htmlnvdVendor Advisory
- www.securityfocus.com/archive/1/535397/100/1100/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/74398nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1032216nvdThird Party AdvisoryVDB Entry
- access.redhat.com/security/cve/cve-2015-3152nvdThird Party Advisory
- jira.mariadb.org/browse/MDEV-7937nvdIssue TrackingVendor Advisory
- www.duosecurity.com/blog/backronym-mysql-vulnerabilitynvdThird Party Advisory
News mentions
0No linked articles in our index yet.