When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-4358 | When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3. |
Ubuntu USN |
USN-3850-1 | NSS vulnerabilities |
Ubuntu USN |
USN-3850-2 | NSS vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-08-05T08:31:00.061Z
Reserved: 2018-06-14T00:00:00
Link: CVE-2018-12384
No data.
Status : Modified
Published: 2019-04-29T15:29:00.247
Modified: 2024-11-21T03:45:06.593
Link: CVE-2018-12384
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN