<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VN-2015-007-LogJam in Security</title>
    <link>https://community.extremenetworks.com/t5/security/vn-2015-007-logjam/m-p/27823#M53</link>
    <description>&lt;A href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-4000" target="_blank" rel="nofollow noreferrer noopener"&gt;CVE-2015-4000&lt;/A&gt; "LogJam" issue is due to the TLS protocol 1.2 and earlier not properly conveying  a DHE_EXPORT choice when a DHE_EXPORT ciphersuite is enabled on a server but  not on a client. This allows man-in-the-middle attackers to conduct  cipher-downgrade attacks.&lt;BR /&gt;
&lt;BR /&gt;
Extreme Networks response to CVE-2015-4000  "LogJam"  vulnerability is available at the following url:  &lt;A href="http://learn.extremenetworks.com/rs/641-VMV-602/images/VN-2015-007_Logjam.pdf" target="_blank" rel="nofollow noreferrer noopener"&gt;http://learn.extremenetworks.com/rs/641-VMV-602/images/VN-2015-007_Logjam.pdf&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Wed, 24 Jun 2015 18:31:00 GMT</pubDate>
    <dc:creator>Weidle__Bert</dc:creator>
    <dc:date>2015-06-24T18:31:00Z</dc:date>
    <item>
      <title>VN-2015-007-LogJam</title>
      <link>https://community.extremenetworks.com/t5/security/vn-2015-007-logjam/m-p/27823#M53</link>
      <description>&lt;A href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-4000" target="_blank" rel="nofollow noreferrer noopener"&gt;CVE-2015-4000&lt;/A&gt; "LogJam" issue is due to the TLS protocol 1.2 and earlier not properly conveying  a DHE_EXPORT choice when a DHE_EXPORT ciphersuite is enabled on a server but  not on a client. This allows man-in-the-middle attackers to conduct  cipher-downgrade attacks.&lt;BR /&gt;
&lt;BR /&gt;
Extreme Networks response to CVE-2015-4000  "LogJam"  vulnerability is available at the following url:  &lt;A href="http://learn.extremenetworks.com/rs/641-VMV-602/images/VN-2015-007_Logjam.pdf" target="_blank" rel="nofollow noreferrer noopener"&gt;http://learn.extremenetworks.com/rs/641-VMV-602/images/VN-2015-007_Logjam.pdf&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 24 Jun 2015 18:31:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/security/vn-2015-007-logjam/m-p/27823#M53</guid>
      <dc:creator>Weidle__Bert</dc:creator>
      <dc:date>2015-06-24T18:31:00Z</dc:date>
    </item>
  </channel>
</rss>

