Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-12384

Опубликовано: 29 апр. 2019
Источник: debian

Описание

When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
nssfixed2:3.39-1package
nsspostponedstretchpackage
nsspostponedjessiepackage

Примечания

  • https://hg.mozilla.org/projects/nss/rev/2ed9f6afd84e (NSS_3_39_BRANCH)

  • https://hg.mozilla.org/projects/nss/rev/46f9a1f40c3d (NSS_3_36_BRANCH)

  • https://bugzilla.mozilla.org/show_bug.cgi?id=1483128

  • https://bugzilla.redhat.com/show_bug.cgi?id=1622089

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 6 лет назад

When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.

CVSS3: 4.8
redhat
около 7 лет назад

When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.

CVSS3: 5.9
nvd
больше 6 лет назад

When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.

CVSS3: 5.9
github
больше 3 лет назад

When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.

oracle-oval
около 7 лет назад

ELSA-2018-2898: nss security update (MODERATE)