When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2018-4358 | When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3. |
![]() |
USN-3850-1 | NSS vulnerabilities |
![]() |
USN-3850-2 | NSS vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-08-05T08:31:00.061Z
Reserved: 2018-06-14T00:00:00
Link: CVE-2018-12384

No data.

Status : Modified
Published: 2019-04-29T15:29:00.247
Modified: 2024-11-21T03:45:06.593
Link: CVE-2018-12384


No data.