Bug 1622089 (CVE-2018-12384)
Summary: | CVE-2018-12384 nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Huzaifa S. Sidhpurwala <huzaifas> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | dueno, elio.maldonado.batiz, hkario, huzaifas, kdudka, mthacker, nss-nspr-maint, rrelyea, security-response-team, szidek, yozone |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | nss 3.36.5, nss 3.39 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in the way NSS responded to an SSLv2-compatible ClientHello with a ServerHello that had an all-zero random. A man-in-the-middle attacker could use this flaw in a passive replay attack.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-10 10:36:55 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1622093, 1622094, 1623245, 1624703, 1624704 | ||
Bug Blocks: | 1616615 |
Description
Huzaifa S. Sidhpurwala
2018-08-24 12:33:29 UTC
External References: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.39_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.36.5_release_notes Created nss tracking bugs for this issue: Affects: fedora-all [bug 1624704] Acknowledgments: Name: the Mozilla project Upstream bug (currently non-public): https://bugzilla.mozilla.org/show_bug.cgi?id=1483128 Upstream fix in 3.36 branch (including test): https://hg.mozilla.org/projects/nss/rev/46f9a1f40c3d https://hg.mozilla.org/projects/nss/rev/f182a11fbe53 It seems a different fix was used in 3.39 that disables processing of SSLv2 compatible Client Hellos: https://hg.mozilla.org/projects/nss/rev/2ed9f6afd84e > It seems a different fix was used in 3.39 that disables processing of SSLv2 compatible Client Hellos
yes, but NSS packages distributed in Red Hat Enterprise Linux fix the issue, not disable support for SSLv2 compatible Client Hellos
Right. The nss packages currently in Red Hat Enterprise Linux are based on upstream 3.36. I assume we will eventually update to 3.39 or newer, so I assume we have to consider how we're going to deal with this at that time. Support for SSLv2 Client Hello protocol is technically part of API/ABI compatibility so it needs to remain in Red Hat Enterprise Linux 6 and 7. (In reply to Tomas Hoger from comment #14) > It seems a different fix was used in 3.39 that disables processing of SSLv2 > compatible Client Hellos: To be clear, the fixes are actually identical in 3.36 and 3.39. The only difference is that the latter fix was obfuscated as part of a large change: https://hg.mozilla.org/projects/nss/rev/ee357b00f2e6#l8.272 Thank you for the correction Daiki, I had previously failed to find the matching change in 3.39. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:2768 https://access.redhat.com/errata/RHSA-2018:2768 This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2018:2898 https://access.redhat.com/errata/RHSA-2018:2898 |