CVE-2018-12384
Published: 4 September 2018
When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.
Priority
Status
Package | Release | Status |
---|---|---|
nss Launchpad, Ubuntu, Debian |
upstream |
Released
(3.36.5,3.39)
|
trusty |
Released
(2:3.28.4-0ubuntu0.14.04.4)
|
|
xenial |
Released
(2:3.28.4-0ubuntu0.16.04.4)
|
|
bionic |
Released
(2:3.35-2ubuntu2.1)
|
|
cosmic |
Released
(2:3.36.1-1ubuntu1.1)
|
|
Patches: upstream: https://hg.mozilla.org/projects/nss/rev/46f9a1f40c3d (3.36) upstream: https://hg.mozilla.org/projects/nss/rev/f182a11fbe53 (3.36) |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.9 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12384
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.39_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.36.5_release_notes
- https://ubuntu.com/security/notices/USN-3850-1
- https://ubuntu.com/security/notices/USN-3850-2
- NVD
- Launchpad
- Debian