CVE-2013-1740

NameCVE-2013-1740
DescriptionThe ssl_Do1stHandshake function in sslsecur.c in libssl in Mozilla Network Security Services (NSS) before 3.15.4, when the TLS False Start feature is enabled, allows man-in-the-middle attackers to spoof SSL servers by using an arbitrary X.509 certificate during certain handshake traffic.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
nss (PTS)jessie, jessie (lts)2:3.26-1+debu8u17fixed
stretch (security)2:3.26.2-1.1+deb9u5fixed
stretch (lts), stretch2:3.26.2-1.1+deb9u6fixed
buster2:3.42.1-1+deb10u5fixed
buster (security)2:3.42.1-1+deb10u6fixed
bullseye (security), bullseye2:3.61-1+deb11u3fixed
bookworm2:3.87.1-1fixed
sid, trixie2:3.92-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
nsssource(unstable)2:3.15.4-1

Notes

[squeeze] - nss <no-dsa> (false start disabled by default, needs to be enabled by clients)
[wheezy] - nss <no-dsa> (false start disabled by default, needs to be enabled by clients)
false start must be enabled by the client (mainly browsers)

Search for package or bug name: Reporting problems