Name | CVE-2018-12384 |
Description | When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 908332 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
nss (PTS) | jessie, jessie (lts) | 2:3.26-1+debu8u18 | vulnerable |
| stretch (security) | 2:3.26.2-1.1+deb9u5 | vulnerable |
| stretch (lts), stretch | 2:3.26.2-1.1+deb9u7 | vulnerable |
| buster (security), buster, buster (lts) | 2:3.42.1-1+deb10u8 | fixed |
| bullseye (security), bullseye | 2:3.61-1+deb11u3 | fixed |
| bookworm | 2:3.87.1-1 | fixed |
| sid, trixie | 2:3.105-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
nss | source | (unstable) | 2:3.39-1 | low | | 908332 |
Notes
[stretch] - nss <postponed> (Minor issue, can be fixed along in future DSA)
[jessie] - nss <postponed> (Minor issue, can be fixed along in future DSA)
https://hg.mozilla.org/projects/nss/rev/2ed9f6afd84e (NSS_3_39_BRANCH)
https://hg.mozilla.org/projects/nss/rev/46f9a1f40c3d (NSS_3_36_BRANCH)
https://bugzilla.mozilla.org/show_bug.cgi?id=1483128
https://bugzilla.redhat.com/show_bug.cgi?id=1622089
[wheezy] - nss <postponed> (Minor issue, can be fixed along in future DSA)