ID CVE-2018-12384
Summary When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.
References
Vulnerable Configurations
  • Mozilla Network Security Services
    cpe:2.3:a:mozilla:network_security_services
  • Mozilla Network Security Services 3.1
    cpe:2.3:a:mozilla:network_security_services:3.1
  • Mozilla Network Security Services 3.1.1
    cpe:2.3:a:mozilla:network_security_services:3.1.1
  • Mozilla Network Security Services 3.2
    cpe:2.3:a:mozilla:network_security_services:3.2
  • Mozilla Network Security Services 3.2.1
    cpe:2.3:a:mozilla:network_security_services:3.2.1
  • Mozilla Network Security Services 3.3
    cpe:2.3:a:mozilla:network_security_services:3.3
  • Mozilla Network Security Services 3.3.1
    cpe:2.3:a:mozilla:network_security_services:3.3.1
  • Mozilla Network Security Services 3.3.2
    cpe:2.3:a:mozilla:network_security_services:3.3.2
  • Mozilla Network Security Services 3.4
    cpe:2.3:a:mozilla:network_security_services:3.4
  • Mozilla Network Security Services 3.4.1
    cpe:2.3:a:mozilla:network_security_services:3.4.1
  • Mozilla Network Security Services 3.4.2
    cpe:2.3:a:mozilla:network_security_services:3.4.2
  • Mozilla Network Security Services 3.4.3
    cpe:2.3:a:mozilla:network_security_services:3.4.3
  • Mozilla Network Security Services 3.5
    cpe:2.3:a:mozilla:network_security_services:3.5
  • Mozilla Network Security Services 3.6
    cpe:2.3:a:mozilla:network_security_services:3.6
  • Mozilla Network Security Services 3.6.1
    cpe:2.3:a:mozilla:network_security_services:3.6.1
  • Mozilla Network Security Services 3.7
    cpe:2.3:a:mozilla:network_security_services:3.7
  • Mozilla Network Security Services 3.7.1
    cpe:2.3:a:mozilla:network_security_services:3.7.1
  • Mozilla Network Security Services 3.7.2
    cpe:2.3:a:mozilla:network_security_services:3.7.2
  • Mozilla Network Security Services 3.7.3
    cpe:2.3:a:mozilla:network_security_services:3.7.3
  • Mozilla Network Security Services 3.7.5
    cpe:2.3:a:mozilla:network_security_services:3.7.5
  • Mozilla Network Security Services 3.7.7
    cpe:2.3:a:mozilla:network_security_services:3.7.7
  • Mozilla Network Security Services 3.8
    cpe:2.3:a:mozilla:network_security_services:3.8
  • Mozilla Network Security Services 3.9
    cpe:2.3:a:mozilla:network_security_services:3.9
  • Mozilla Network Security Services 3.9.1
    cpe:2.3:a:mozilla:network_security_services:3.9.1
  • Mozilla Network Security Services 3.9.2
    cpe:2.3:a:mozilla:network_security_services:3.9.2
  • Mozilla Network Security Services 3.9.3
    cpe:2.3:a:mozilla:network_security_services:3.9.3
  • Mozilla Network Security Services 3.9.4
    cpe:2.3:a:mozilla:network_security_services:3.9.4
  • Mozilla Network Security Services 3.9.5
    cpe:2.3:a:mozilla:network_security_services:3.9.5
  • Mozilla Network Security Services 3.10
    cpe:2.3:a:mozilla:network_security_services:3.10
  • Mozilla Network Security Services 3.10.1
    cpe:2.3:a:mozilla:network_security_services:3.10.1
  • Mozilla Network Security Services 3.10.2
    cpe:2.3:a:mozilla:network_security_services:3.10.2
  • Mozilla Network Security Services 3.11
    cpe:2.3:a:mozilla:network_security_services:3.11
  • Mozilla Network Security Services 3.11.1
    cpe:2.3:a:mozilla:network_security_services:3.11.1
  • Mozilla Network Security Services 3.11.2
    cpe:2.3:a:mozilla:network_security_services:3.11.2
  • Mozilla Network Security Services 3.11.3
    cpe:2.3:a:mozilla:network_security_services:3.11.3
  • Mozilla Network Security Services 3.11.4
    cpe:2.3:a:mozilla:network_security_services:3.11.4
  • Mozilla Network Security Services 3.11.5
    cpe:2.3:a:mozilla:network_security_services:3.11.5
  • Mozilla Network Security Services 3.11.6
    cpe:2.3:a:mozilla:network_security_services:3.11.6
  • Mozilla Network Security Services 3.11.7
    cpe:2.3:a:mozilla:network_security_services:3.11.7
  • Mozilla Network Security Services 3.11.8
    cpe:2.3:a:mozilla:network_security_services:3.11.8
  • Mozilla Network Security Services 3.11.9
    cpe:2.3:a:mozilla:network_security_services:3.11.9
  • Mozilla Network Security Services 3.11.10
    cpe:2.3:a:mozilla:network_security_services:3.11.10
  • Mozilla Network Security Services 3.12
    cpe:2.3:a:mozilla:network_security_services:3.12
  • Mozilla Network Security Services 3.12.1
    cpe:2.3:a:mozilla:network_security_services:3.12.1
  • Mozilla Network Security Services 3.12.2
    cpe:2.3:a:mozilla:network_security_services:3.12.2
  • Mozilla Network Security Services 3.12.3
    cpe:2.3:a:mozilla:network_security_services:3.12.3
  • Mozilla Network Security Services 3.12.3.1
    cpe:2.3:a:mozilla:network_security_services:3.12.3.1
  • Mozilla Network Security Services 3.12.3.2
    cpe:2.3:a:mozilla:network_security_services:3.12.3.2
  • Mozilla Network Security Services 3.12.4
    cpe:2.3:a:mozilla:network_security_services:3.12.4
  • Mozilla Network Security Services 3.12.5
    cpe:2.3:a:mozilla:network_security_services:3.12.5
  • Mozilla Network Security Services 3.12.6
    cpe:2.3:a:mozilla:network_security_services:3.12.6
  • Mozilla Network Security Services 3.12.7
    cpe:2.3:a:mozilla:network_security_services:3.12.7
  • Mozilla Network Security Services 3.12.8
    cpe:2.3:a:mozilla:network_security_services:3.12.8
  • Mozilla Network Security Services 3.12.9
    cpe:2.3:a:mozilla:network_security_services:3.12.9
  • Mozilla Network Security Services 3.12.10
    cpe:2.3:a:mozilla:network_security_services:3.12.10
  • Mozilla Network Security Services 3.12.11
    cpe:2.3:a:mozilla:network_security_services:3.12.11
  • Mozilla Network Security Services 3.14
    cpe:2.3:a:mozilla:network_security_services:3.14
  • Mozilla Network Security Services 3.14.1
    cpe:2.3:a:mozilla:network_security_services:3.14.1
  • Mozilla Network Security Services 3.14.2
    cpe:2.3:a:mozilla:network_security_services:3.14.2
  • Mozilla Network Security Services 3.14.3
    cpe:2.3:a:mozilla:network_security_services:3.14.3
  • Mozilla Network Security Services 3.14.4
    cpe:2.3:a:mozilla:network_security_services:3.14.4
  • Mozilla Network Security Services 3.14.5
    cpe:2.3:a:mozilla:network_security_services:3.14.5
  • Mozilla Network Security Services 3.15
    cpe:2.3:a:mozilla:network_security_services:3.15
  • Mozilla Network Security Services 3.15.1
    cpe:2.3:a:mozilla:network_security_services:3.15.1
  • Mozilla Network Security Services 3.15.2
    cpe:2.3:a:mozilla:network_security_services:3.15.2
  • Mozilla Network Security Services 3.15.3
    cpe:2.3:a:mozilla:network_security_services:3.15.3
  • Mozilla Network Security Services 3.15.3.1
    cpe:2.3:a:mozilla:network_security_services:3.15.3.1
  • Mozilla Network Security Services 3.15.4
    cpe:2.3:a:mozilla:network_security_services:3.15.4
  • Mozilla Network Security Services 3.15.5
    cpe:2.3:a:mozilla:network_security_services:3.15.5
  • Mozilla Network Security Services 3.16
    cpe:2.3:a:mozilla:network_security_services:3.16
  • Mozilla Network Security Services 3.16.1
    cpe:2.3:a:mozilla:network_security_services:3.16.1
  • Mozilla Network Security Services 3.16.2
    cpe:2.3:a:mozilla:network_security_services:3.16.2
  • Mozilla Network Security Services 3.16.2.1
    cpe:2.3:a:mozilla:network_security_services:3.16.2.1
  • Mozilla Network Security Services 3.16.2.2
    cpe:2.3:a:mozilla:network_security_services:3.16.2.2
  • Mozilla Network Security Services 3.16.2.3
    cpe:2.3:a:mozilla:network_security_services:3.16.2.3
  • Mozilla Network Security Services 3.16.3
    cpe:2.3:a:mozilla:network_security_services:3.16.3
  • Mozilla Network Security Services 3.16.4
    cpe:2.3:a:mozilla:network_security_services:3.16.4
  • Mozilla Network Security Services 3.16.5
    cpe:2.3:a:mozilla:network_security_services:3.16.5
  • Mozilla Network Security Services 3.16.6
    cpe:2.3:a:mozilla:network_security_services:3.16.6
  • Mozilla Network Security Services 3.17
    cpe:2.3:a:mozilla:network_security_services:3.17
  • Mozilla Network Security Services 3.17.1
    cpe:2.3:a:mozilla:network_security_services:3.17.1
  • Mozilla Network Security Services 3.17.2
    cpe:2.3:a:mozilla:network_security_services:3.17.2
  • Mozilla Network Security Services 3.17.3
    cpe:2.3:a:mozilla:network_security_services:3.17.3
  • Mozilla Network Security Services 3.17.4
    cpe:2.3:a:mozilla:network_security_services:3.17.4
  • Mozilla Network Security Services 3.18
    cpe:2.3:a:mozilla:network_security_services:3.18
  • Mozilla Network Security Services 3.18.1
    cpe:2.3:a:mozilla:network_security_services:3.18.1
  • Mozilla Network Security Services (NSS) 3.19
    cpe:2.3:a:mozilla:network_security_services:3.19
  • Mozilla Network Security Services 3.19.1
    cpe:2.3:a:mozilla:network_security_services:3.19.1
  • Mozilla Network Security Services 3.19.2
    cpe:2.3:a:mozilla:network_security_services:3.19.2
  • Mozilla Network Security Services 3.19.2.0
    cpe:2.3:a:mozilla:network_security_services:3.19.2.0
  • Mozilla Network Security Services 3.19.3
    cpe:2.3:a:mozilla:network_security_services:3.19.3
  • Mozilla Network Security Services 3.20
    cpe:2.3:a:mozilla:network_security_services:3.20
  • Mozilla Network Security Services 3.20.0
    cpe:2.3:a:mozilla:network_security_services:3.20.0
  • Mozilla Network Security Services 3.20.1
    cpe:2.3:a:mozilla:network_security_services:3.20.1
  • Mozilla Network Security Services 3.21
    cpe:2.3:a:mozilla:network_security_services:3.21
  • Mozilla Network Security Services 3.21.1
    cpe:2.3:a:mozilla:network_security_services:3.21.1
  • Mozilla Network Security Services 3.21.2
    cpe:2.3:a:mozilla:network_security_services:3.21.2
  • Mozilla Network Security Services (NSS) 3.21.3
    cpe:2.3:a:mozilla:network_security_services:3.21.3
  • Mozilla Network Security Services 3.21.4
    cpe:2.3:a:mozilla:network_security_services:3.21.4
  • Mozilla Network Security Services (NSS) 3.22
    cpe:2.3:a:mozilla:network_security_services:3.22
  • Mozilla Network Security Services 3.22.1
    cpe:2.3:a:mozilla:network_security_services:3.22.1
  • Mozilla Network Security Services 3.22.2
    cpe:2.3:a:mozilla:network_security_services:3.22.2
  • Mozilla Network Security Services 3.23
    cpe:2.3:a:mozilla:network_security_services:3.23
  • Mozilla Network Security Services 3.24
    cpe:2.3:a:mozilla:network_security_services:3.24
  • Mozilla Network Security Services 3.25
    cpe:2.3:a:mozilla:network_security_services:3.25
  • Mozilla Network Security Services 3.25.0
    cpe:2.3:a:mozilla:network_security_services:3.25.0
  • Mozilla Network Security Services 3.25.1
    cpe:2.3:a:mozilla:network_security_services:3.25.1
  • Mozilla Network Security Services 3.26
    cpe:2.3:a:mozilla:network_security_services:3.26
  • Mozilla Network Security Services 3.26.0
    cpe:2.3:a:mozilla:network_security_services:3.26.0
  • Mozilla Network Security Services 3.26.2
    cpe:2.3:a:mozilla:network_security_services:3.26.2
  • Mozilla Network Security Services 3.27
    cpe:2.3:a:mozilla:network_security_services:3.27
  • Mozilla Network Security Services 3.27.0
    cpe:2.3:a:mozilla:network_security_services:3.27.0
  • Mozilla Network Security Services 3.27.1
    cpe:2.3:a:mozilla:network_security_services:3.27.1
  • Mozilla Network Security Services 3.27.2
    cpe:2.3:a:mozilla:network_security_services:3.27.2
  • Mozilla Network Security Services 3.28
    cpe:2.3:a:mozilla:network_security_services:3.28
  • Mozilla Network Security Services 3.28.0
    cpe:2.3:a:mozilla:network_security_services:3.28.0
  • Mozilla Network Security Services 3.28.1
    cpe:2.3:a:mozilla:network_security_services:3.28.1
  • Mozilla Network Security Services 3.28.2
    cpe:2.3:a:mozilla:network_security_services:3.28.2
  • Mozilla Network Security Services (NSS) 3.28.3
    cpe:2.3:a:mozilla:network_security_services:3.28.3
  • Mozilla Network Security Services 3.28.4
    cpe:2.3:a:mozilla:network_security_services:3.28.4
  • Mozilla Network Security Services 3.28.5
    cpe:2.3:a:mozilla:network_security_services:3.28.5
  • Mozilla Network Security Services 3.29
    cpe:2.3:a:mozilla:network_security_services:3.29
  • Mozilla Network Security Services 3.29.1
    cpe:2.3:a:mozilla:network_security_services:3.29.1
  • Mozilla Network Security Services 3.29.2
    cpe:2.3:a:mozilla:network_security_services:3.29.2
  • Mozilla Network Security Services (NSS) 3.29.3
    cpe:2.3:a:mozilla:network_security_services:3.29.3
  • Mozilla Network Security Services 3.29.5
    cpe:2.3:a:mozilla:network_security_services:3.29.5
  • Mozilla Network Security Services (NSS) 3.30
    cpe:2.3:a:mozilla:network_security_services:3.30
  • Mozilla Network Security Services 3.30.1
    cpe:2.3:a:mozilla:network_security_services:3.30.1
  • Mozilla Network Security Services 3.30.2
    cpe:2.3:a:mozilla:network_security_services:3.30.2
  • Mozilla Network Security Services 3.31
    cpe:2.3:a:mozilla:network_security_services:3.31
  • Mozilla Network Security Services 3.31.1
    cpe:2.3:a:mozilla:network_security_services:3.31.1
  • Mozilla Network Security Services 3.32
    cpe:2.3:a:mozilla:network_security_services:3.32
  • Mozilla Network Security Services 3.33
    cpe:2.3:a:mozilla:network_security_services:3.33
  • Mozilla Network Security Services 3.34
    cpe:2.3:a:mozilla:network_security_services:3.34
  • Mozilla Network Security Services 3.34.1
    cpe:2.3:a:mozilla:network_security_services:3.34.1
  • Mozilla Network Security Services 3.35
    cpe:2.3:a:mozilla:network_security_services:3.35
  • Mozilla Network Security Services 3.36
    cpe:2.3:a:mozilla:network_security_services:3.36
  • Mozilla Network Security Services 3.36.1
    cpe:2.3:a:mozilla:network_security_services:3.36.1
  • Mozilla Network Security Services 3.36.2
    cpe:2.3:a:mozilla:network_security_services:3.36.2
  • Mozilla Network Security Services 3.36.4
    cpe:2.3:a:mozilla:network_security_services:3.36.4
  • Mozilla Network Security Services 3.37
    cpe:2.3:a:mozilla:network_security_services:3.37
  • Mozilla Network Security Services 3.37.1
    cpe:2.3:a:mozilla:network_security_services:3.37.1
  • Mozilla Network Security Services 3.37.3
    cpe:2.3:a:mozilla:network_security_services:3.37.3
  • Mozilla Network Security Services 3.38
    cpe:2.3:a:mozilla:network_security_services:3.38
CVSS
Base: 4.3
Impact:
Exploitability:
CWE CWE-254
CAPEC
nessus via4
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2018-2898.NASL
    description An update for nss is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es) : * nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello (CVE-2018-12384) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting this issue.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 118022
    published 2018-10-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118022
    title CentOS 6 : nss (CESA-2018:2898)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20181009_NSS_ON_SL6_X.NASL
    description Security Fix(es) : - nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello (CVE-2018-12384)
    last seen 2019-02-21
    modified 2018-12-27
    plugin id 118058
    published 2018-10-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118058
    title Scientific Linux Security Update : nss on SL6.x i386/x86_64
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-4236-1.NASL
    description This update for MozillaFirefox, mozilla-nss and mozilla-nspr fixes the following issues : Issues fixed in MozillaFirefox : Update to Firefox ESR 60.4 (bsc#1119105) CVE-2018-17466: Fixed a buffer overflow and out-of-bounds read in ANGLE library with TextureStorage11 CVE-2018-18492: Fixed a use-after-free with select element CVE-2018-18493: Fixed a buffer overflow in accelerated 2D canvas with Skia CVE-2018-18494: Fixed a Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs CVE-2018-18498: Fixed a integer overflow when calculating buffer sizes for images CVE-2018-12405: Fixed a few memory safety bugs Issues fixed in mozilla-nss: Update to NSS 3.40.1 (bsc#1119105) CVE-2018-12404: Fixed a cache side-channel variant of the Bleichenbacher attack (bsc#1119069) CVE-2018-12384: Fixed an issue in the SSL handshake. NSS responded to an SSLv2-compatible ClientHello with a ServerHello that had an all-zero random. (bsc#1106873) CVE-2018-0495: Fixed a memory-cache side-channel attack with ECDSA signatures (bsc#1097410) Fixed a decryption failure during FFDHE key exchange Various security fixes in the ASN.1 code Issues fixed in mozilla-nspr: Update mozilla-nspr to 4.20 (bsc#1119105) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-24
    plugin id 119871
    published 2018-12-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119871
    title SUSE SLED12 / SLES12 Security Update : MozillaFirefox, mozilla-nspr / mozilla-nss (SUSE-SU-2018:4236-1)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2018-2768.NASL
    description An update for nss is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es) : * nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello (CVE-2018-12384) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting this issue.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 117832
    published 2018-10-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117832
    title CentOS 7 : nss (CESA-2018:2768)
  • NASL family Junos Local Security Checks
    NASL id JUNIPER_SPACE_JSA10917_184R1.NASL
    description According to its self-reported version number, the remote Junos Space version is 18.4.x prior to 18.4R1. It is, therefore, affected by multiple vulnerabilities : - An integer overflow issue exists in procps-ng. This is related to CVE-2018-1124. (CVE-2018-1126) - A directory traversal issue exits in reposync, a part of yum-utils.tory configuration files. If an attacker controls a repository, they may be able to copy files outside of the destination directory on the targeted system via path traversal. (CVE-2018-10897) - An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID binary could use this flaw to escalate their privileges on the system. (CVE-2018-14634) Additionally, Junos Space is affected by several other vulnerabilities exist as noted in the vendor advisory. Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2019-01-10
    plugin id 121068
    published 2019-01-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121068
    title Juniper Junos Space 18.4.x < 18.4R1 Multiple Vulnerabilities (JSA10917)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2018-2898.NASL
    description An update for nss is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es) : * nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello (CVE-2018-12384) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting this issue.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 118030
    published 2018-10-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118030
    title RHEL 6 : nss (RHSA-2018:2898)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3850-1.NASL
    description Keegan Ryan discovered that NSS incorrectly handled ECDSA key generation. A local attacker could possibly use this issue to perform a cache-timing attack and recover private ECDSA keys. (CVE-2018-0495) It was discovered that NSS incorrectly handled certain v2-compatible ClientHello messages. A remote attacker could possibly use this issue to perform a replay attack. (CVE-2018-12384) It was discovered that NSS incorrectly handled certain padding oracles. A remote attacker could possibly use this issue to perform a variant of the Bleichenbacher attack. (CVE-2018-12404). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-10
    plugin id 121062
    published 2019-01-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121062
    title Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 18.10 : nss vulnerabilities (USN-3850-1)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-1618.NASL
    description This update for mozilla-nss and mozilla-nspr fixes the following issues : Issues fixed in mozilla-nss : - Update to NSS 3.40.1 (bsc#1119105) - CVE-2018-12404: Fixed a cache side-channel variant of the Bleichenbacher attack (bsc#1119069) - CVE-2018-12384: Fixed an issue in the SSL handshake. NSS responded to an SSLv2-compatible ClientHello with a ServerHello that had an all-zero random. (bsc#1106873) - CVE-2018-0495: Fixed a memory-cache side-channel attack with ECDSA signatures (bsc#1097410) - Fixed a decryption failure during FFDHE key exchange - Various security fixes in the ASN.1 code Issues fixed in mozilla-nspr : - Update mozilla-nspr to 4.20 (bsc#1119105) This update was imported from the SUSE:SLE-15:Update update project.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 119948
    published 2018-12-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119948
    title openSUSE Security Update : mozilla-nspr and mozilla-nss (openSUSE-2018-1618)
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2018-1358.NASL
    description According to the version of the nss packages installed, the EulerOS installation on the remote host is affected by the following vulnerability : - ServerHello.random is all zeros when handling a v2-compatible ClientHello (CVE-2018-12384) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-13
    plugin id 118741
    published 2018-11-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118741
    title EulerOS 2.0 SP2 : nss (EulerOS-SA-2018-1358)
  • NASL family Virtuozzo Local Security Checks
    NASL id VIRTUOZZO_VZLSA-2018-2898.NASL
    description An update for nss is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es) : * nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello (CVE-2018-12384) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting this issue. Note that Tenable Network Security has attempted to extract the preceding description block directly from the corresponding Red Hat security advisory. Virtuozzo provides no description for VZLSA advisories. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-21
    plugin id 119086
    published 2018-11-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119086
    title Virtuozzo 6 : nss / nss-devel / nss-pkcs11-devel / nss-sysinit / etc (VZLSA-2018-2898)
  • NASL family Amazon Linux Local Security Checks
    NASL id AL2_ALAS-2018-1095.NASL
    description A flaw was found in the way NSS responded to an SSLv2-compatible ClientHello with a ServerHello that had an all-zero random. A man-in-the-middle attacker could use this flaw in a passive replay attack.(CVE-2018-12384)
    last seen 2019-02-21
    modified 2018-10-26
    plugin id 118402
    published 2018-10-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118402
    title Amazon Linux 2 : nss (ALAS-2018-1095)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2018-2768.NASL
    description An update for nss is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es) : * nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello (CVE-2018-12384) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting this issue.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 117778
    published 2018-09-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117778
    title RHEL 7 : nss (RHSA-2018:2768)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20180925_NSS_ON_SL7_X.NASL
    description Security Fix(es) : - nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello (CVE-2018-12384)
    last seen 2019-02-21
    modified 2018-12-27
    plugin id 117788
    published 2018-09-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117788
    title Scientific Linux Security Update : nss on SL7.x x86_64
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2018-1095.NASL
    description A flaw was found in the way NSS responded to an SSLv2-compatible ClientHello with a ServerHello that had an all-zero random. A man-in-the-middle attacker could use this flaw in a passive replay attack.(CVE-2018-12384)
    last seen 2019-02-21
    modified 2018-10-25
    plugin id 118362
    published 2018-10-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118362
    title Amazon Linux AMI : nss (ALAS-2018-1095)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-1540.NASL
    description This update for mozilla-nss to version 3.36.6 fixes the following issues : Security issues fixed : - CVE-2018-12384: NSS responded to an SSLv2-compatible ClientHello with a ServerHello that had an all-zero random (bmo#1483128, boo#1106873) - CVE-2018-12404: Cache side-channel variant of the Bleichenbacher attack (bmo#1485864, boo#1119069)
    last seen 2019-02-21
    modified 2018-12-14
    plugin id 119670
    published 2018-12-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119670
    title openSUSE Security Update : mozilla-nss (openSUSE-2018-1540)
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2018-1366.NASL
    description According to the version of the nss packages installed, the EulerOS installation on the remote host is affected by the following vulnerability : - ServerHello.random is all zeros when handling a v2-compatible ClientHello (CVE-2018-12384) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-13
    plugin id 118760
    published 2018-11-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118760
    title EulerOS 2.0 SP3 : nss (EulerOS-SA-2018-1366)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2018-C72D2D89EC.NASL
    description Updates the nss family of packages to upstream NSPR 4.20 and NSS 3.39. For details about new functionality and a list of bugs fixed in this release please see the upstream release notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.39 _release_notes Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-03
    plugin id 120778
    published 2019-01-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=120778
    title Fedora 29 : nspr / nss / nss-softokn / nss-util (2018-c72d2d89ec)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2018-2768.NASL
    description From Red Hat Security Advisory 2018:2768 : An update for nss is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es) : * nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello (CVE-2018-12384) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting this issue.
    last seen 2019-02-21
    modified 2018-09-27
    plugin id 117768
    published 2018-09-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117768
    title Oracle Linux 7 : nss (ELSA-2018-2768)
  • NASL family OracleVM Local Security Checks
    NASL id ORACLEVM_OVMSA-2018-0264.NASL
    description The remote OracleVM system is missing necessary patches to address critical security updates : - Added nss-vendor.patch to change vendor - Temporarily disable some tests until expired PayPalEE.cert is renewed - Backport upstream fix for (CVE-2018-12384) - Remove nss-lockcert-api-change.patch, which turned out to be a mistake (the symbol was not exported from libnss) - Restore CERT_LockCertTrust and CERT_UnlockCertTrust back in cert.h - rebuild - Keep legacy code signing trust flags for backwards compatibility - Decrease the iteration count of PKCS#12 for compatibility with Windows - Fix deadlock when a token is re-inserted while a client process is running - Ignore tests which only works with newer nss-softokn - Use the correct tarball of NSS 3.36 release - Ignore EncryptDeriveTest which only works with newer nss-softokn - Don't skip non-FIPS and ECC test cases in ssl.sh - Rebase to NSS 3.36.0 - Rebase to NSS 3.36.0 BETA - Remove upstreamed nss-is-token-present-race.patch - Revert the upstream changes that default to sql database - Replace race.patch and nss-3.16-token-init-race.patch with a proper upstream fix - Don't restrict nss_cycles to sharedb - Rebase to NSS 3.34.0
    last seen 2019-02-21
    modified 2018-10-11
    plugin id 118051
    published 2018-10-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118051
    title OracleVM 3.3 / 3.4 : nss (OVMSA-2018-0264)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2018-4A21A8CA59.NASL
    description Updates the nss family of packages to upstream NSPR 4.20 and NSS 3.39. For details about new functionality and a list of bugs fixed in this release please see the upstream release notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.39 _release_notes Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-09-18
    plugin id 117532
    published 2018-09-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117532
    title Fedora 27 : nspr / nss / nss-softokn / nss-util (2018-4a21a8ca59)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-4235-1.NASL
    description This update for MozillaFirefox, mozilla-nss and mozilla-nspr fixes the following issues : Issues fixed in MozillaFirefox : Update to Firefox ESR 60.4 (bsc#1119105) CVE-2018-17466: Fixed a buffer overflow and out-of-bounds read in ANGLE library with TextureStorage11 CVE-2018-18492: Fixed a use-after-free with select element CVE-2018-18493: Fixed a buffer overflow in accelerated 2D canvas with Skia CVE-2018-18494: Fixed a Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs CVE-2018-18498: Fixed a integer overflow when calculating buffer sizes for images CVE-2018-12405: Fixed a few memory safety bugs Issues fixed in mozilla-nss: Update to NSS 3.40.1 (bsc#1119105) CVE-2018-12404: Fixed a cache side-channel variant of the Bleichenbacher attack (bsc#1119069) CVE-2018-12384: Fixed an issue in the SSL handshake. NSS responded to an SSLv2-compatible ClientHello with a ServerHello that had an all-zero random. (bsc#1106873) CVE-2018-0495: Fixed a memory-cache side-channel attack with ECDSA signatures (bsc#1097410) Fixed a decryption failure during FFDHE key exchange Various security fixes in the ASN.1 code Issues fixed in mozilla-nspr: Update mozilla-nspr to 4.20 (bsc#1119105) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 120193
    published 2019-01-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=120193
    title SUSE SLED15 / SLES15 Security Update : MozillaFirefox, mozilla-nspr / mozilla-nss (SUSE-SU-2018:4235-1)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2018-1A7A5C54C2.NASL
    description Updates the nss family of packages to upstream NSPR 4.20 and NSS 3.39. For details about new functionality and a list of bugs fixed in this release please see the upstream release notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.39 _release_notes Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-03
    plugin id 120262
    published 2019-01-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=120262
    title Fedora 28 : nspr / nss / nss-softokn / nss-util (2018-1a7a5c54c2)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2018-2898.NASL
    description From Red Hat Security Advisory 2018:2898 : An update for nss is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es) : * nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello (CVE-2018-12384) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank the Mozilla project for reporting this issue.
    last seen 2019-02-21
    modified 2018-10-10
    plugin id 118027
    published 2018-10-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118027
    title Oracle Linux 6 : nss (ELSA-2018-2898)
redhat via4
advisories
  • bugzilla
    id 1622089
    title CVE-2018-12384 nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 7 Client is installed
        oval oval:com.redhat.rhba:tst:20150364001
      • comment Red Hat Enterprise Linux 7 Server is installed
        oval oval:com.redhat.rhba:tst:20150364002
      • comment Red Hat Enterprise Linux 7 Workstation is installed
        oval oval:com.redhat.rhba:tst:20150364003
      • comment Red Hat Enterprise Linux 7 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20150364004
    • OR
      • AND
        • comment nss is earlier than 0:3.36.0-7.el7_5
          oval oval:com.redhat.rhsa:tst:20182768005
        • comment nss is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20150364010
      • AND
        • comment nss-devel is earlier than 0:3.36.0-7.el7_5
          oval oval:com.redhat.rhsa:tst:20182768011
        • comment nss-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20150364016
      • AND
        • comment nss-pkcs11-devel is earlier than 0:3.36.0-7.el7_5
          oval oval:com.redhat.rhsa:tst:20182768013
        • comment nss-pkcs11-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20150364018
      • AND
        • comment nss-sysinit is earlier than 0:3.36.0-7.el7_5
          oval oval:com.redhat.rhsa:tst:20182768009
        • comment nss-sysinit is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20150364014
      • AND
        • comment nss-tools is earlier than 0:3.36.0-7.el7_5
          oval oval:com.redhat.rhsa:tst:20182768007
        • comment nss-tools is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20150364012
    rhsa
    id RHSA-2018:2768
    released 2018-09-25
    severity Moderate
    title RHSA-2018:2768: nss security update (Moderate)
  • bugzilla
    id 1622089
    title CVE-2018-12384 nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhba:tst:20111656001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhba:tst:20111656002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhba:tst:20111656003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20111656004
    • OR
      • AND
        • comment nss is earlier than 0:3.36.0-9.el6_10
          oval oval:com.redhat.rhsa:tst:20182898011
        • comment nss is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20150364010
      • AND
        • comment nss-devel is earlier than 0:3.36.0-9.el6_10
          oval oval:com.redhat.rhsa:tst:20182898005
        • comment nss-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20150364016
      • AND
        • comment nss-pkcs11-devel is earlier than 0:3.36.0-9.el6_10
          oval oval:com.redhat.rhsa:tst:20182898009
        • comment nss-pkcs11-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20150364018
      • AND
        • comment nss-sysinit is earlier than 0:3.36.0-9.el6_10
          oval oval:com.redhat.rhsa:tst:20182898013
        • comment nss-sysinit is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20150364014
      • AND
        • comment nss-tools is earlier than 0:3.36.0-9.el6_10
          oval oval:com.redhat.rhsa:tst:20182898007
        • comment nss-tools is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20150364012
    rhsa
    id RHSA-2018:2898
    released 2018-10-09
    severity Moderate
    title RHSA-2018:2898: nss security update (Moderate)
rpms
  • nss-0:3.36.0-7.el7_5
  • nss-devel-0:3.36.0-7.el7_5
  • nss-pkcs11-devel-0:3.36.0-7.el7_5
  • nss-sysinit-0:3.36.0-7.el7_5
  • nss-tools-0:3.36.0-7.el7_5
  • nss-0:3.36.0-9.el6_10
  • nss-devel-0:3.36.0-9.el6_10
  • nss-pkcs11-devel-0:3.36.0-9.el6_10
  • nss-sysinit-0:3.36.0-9.el6_10
  • nss-tools-0:3.36.0-9.el6_10
refmap via4
confirm https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-12384
Last major update 29-04-2019 - 11:29
Published 29-04-2019 - 11:29
Last modified 03-05-2019 - 10:29
Back to Top