CVE-2018-12384
Publication date 4 September 2018
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.
Status
Package | Ubuntu Release | Status |
---|---|---|
nss | ||
18.04 LTS bionic |
Fixed 2:3.35-2ubuntu2.1
|
|
16.04 LTS xenial |
Fixed 2:3.28.4-0ubuntu0.16.04.4
|
|
14.04 LTS trusty |
Fixed 2:3.28.4-0ubuntu0.14.04.4
|
Patch details
Package | Patch details |
---|---|
nss |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.9 · Medium |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-3850-1
- NSS vulnerabilities
- 9 January 2019
- USN-3850-2
- NSS vulnerabilities
- 18 February 2019