First published: Thu Jul 09 2015(Updated: )
Karthikeyan Bhargavan discovered that NSS incorrectly handled state transitions for the TLS state machine. If a remote attacker were able to perform a machine-in-the-middle attack, this flaw could be exploited to skip the ServerKeyExchange message and remove the forward-secrecy property. (CVE-2015-2721) Watson Ladd discovered that NSS incorrectly handled Elliptical Curve Cryptography (ECC) multiplication. A remote attacker could possibly use this issue to spoof ECDSA signatures. (CVE-2015-2730) As a security improvement, this update modifies NSS behaviour to reject DH key sizes below 768 bits, preventing a possible downgrade attack. This update also refreshes the NSS package to version 3.19.2 which includes the latest CA certificate bundle.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libnss3 | <2:3.19.2-0ubuntu15.04.1 | 2:3.19.2-0ubuntu15.04.1 |
=15.04 | ||
All of | ||
ubuntu/libnss3 | <2:3.19.2-0ubuntu0.14.10.1 | 2:3.19.2-0ubuntu0.14.10.1 |
=14.10 | ||
All of | ||
ubuntu/libnss3 | <2:3.19.2-0ubuntu0.14.04.1 | 2:3.19.2-0ubuntu0.14.04.1 |
=14.04 | ||
All of | ||
ubuntu/libnss3 | <3.19.2-0ubuntu0.12.04.1 | 3.19.2-0ubuntu0.12.04.1 |
=12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is USN-2672-1.
NSS incorrectly handled state transitions for the TLS state machine.
An attacker could exploit this vulnerability to perform a man-in-the-middle attack and remove the forward-secrecy property.
By performing a machine-in-the-middle attack, an attacker can exploit this vulnerability.
You can find more information about this vulnerability at the following references: [CVE-2015-2721](https://ubuntu.com/security/CVE-2015-2721), [CVE-2015-2730](https://ubuntu.com/security/CVE-2015-2730), [USN-2673-1](https://ubuntu.com/security/notices/USN-2673-1)