CVE-2015-3152

5.9 MEDIUM
Published: May 16, 2016 Modified: May 06, 2026
View on NVD

Description

Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a "BACKRONYM" attack.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161436.html
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161625.html
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://mysqlblog.fivefarmers.com/2014/04/02/redefining-ssl-option/
Source: secalert@redhat.com
Exploit Third Party Advisory
http://packetstormsecurity.com/files/131688/MySQL-SSL-TLS-Downgrade.html
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://rhn.redhat.com/errata/RHSA-2015-1646.html
Source: secalert@redhat.com
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1647.html
Source: secalert@redhat.com
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1665.html
Source: secalert@redhat.com
Third Party Advisory
http://www.debian.org/security/2015/dsa-3311
Source: secalert@redhat.com
Third Party Advisory
http://www.ocert.org/advisories/ocert-2015-003.html
Source: secalert@redhat.com
Vendor Advisory
http://www.securityfocus.com/archive/1/535397/100/1100/threaded
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/74398
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1032216
Source: secalert@redhat.com
Third Party Advisory VDB Entry
https://access.redhat.com/security/cve/cve-2015-3152
Source: secalert@redhat.com
Third Party Advisory
https://jira.mariadb.org/browse/MDEV-7937
Source: secalert@redhat.com
Issue Tracking Vendor Advisory
https://www.duosecurity.com/blog/backronym-mysql-vulnerability
Source: secalert@redhat.com
Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161436.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161625.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://mysqlblog.fivefarmers.com/2014/04/02/redefining-ssl-option/
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
http://mysqlblog.fivefarmers.com/2015/04/29/ssltls-in-5-6-and-5-5-ocert-advisory/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://packetstormsecurity.com/files/131688/MySQL-SSL-TLS-Downgrade.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://rhn.redhat.com/errata/RHSA-2015-1646.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1647.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1665.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2015/dsa-3311
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ocert.org/advisories/ocert-2015-003.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/archive/1/535397/100/1100/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/74398
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1032216
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://access.redhat.com/security/cve/cve-2015-3152
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://github.com/mysql/mysql-server/commit/3bd5589e1a5a93f9c224badf983cd65c45215390
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://jira.mariadb.org/browse/MDEV-7937
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Vendor Advisory
https://www.duosecurity.com/blog/backronym-mysql-vulnerability
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

34 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.9 / 10.0
EPSS (Exploit Probability)
51.7%
98th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

php debian mariadb fedoraproject oracle redhat