First published: Fri Aug 24 2018(Updated: )
A flaw was found with NSS library when compiled with a server application. A man-in-the-middle attacker could use this flaw in a passive replay attack. The most severe issue for confidentiality is for stream ciphers (and AES-GCM), as the server may encrypt different data with the exact same key stream and idempotency, the server may perform same action multiple times without proper authentication
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Network Security Services | <3.39 | |
redhat/nss | <3.36.5 | 3.36.5 |
redhat/nss | <3.39 | 3.39 |
debian/nss | 2:3.61-1+deb11u3 2:3.61-1+deb11u4 2:3.87.1-1 2:3.87.1-1+deb12u1 2:3.106-1 | |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12384 is a vulnerability that affects the handling of SSLv2-compatible ClientHello requests in the NSS library, resulting in full malleability of the ClientHello for SSLv2 used for TLS 1.2.
CVE-2018-12384 has a severity score of 5.9, which is considered medium.
NSS versions prior to 3.39 are affected by CVE-2018-12384.
To fix CVE-2018-12384, update the NSS library to version 3.39 or higher.
You can find more information about CVE-2018-12384 in the references provided: Bugzilla Mozilla, Oracle Security Advisory, and Launchpad Bugs.