Bug 1877557 (CVE-2020-12413) - CVE-2020-12413 nss: Information exposure when DH secret are reused across multiple TLS connections
Summary: CVE-2020-12413 nss: Information exposure when DH secret are reused across mul...
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2020-12413
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1879367 1877558 1878921 1878922 1879366 1910629
Blocks: 1877559
TreeView+ depends on / blocked
 
Reported: 2020-09-09 20:24 UTC by Pedro Sampaio
Modified: 2024-06-13 23:03 UTC (History)
12 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2021-11-02 17:45:55 UTC
Embargoed:


Attachments (Terms of Use)

Description Pedro Sampaio 2020-09-09 20:24:42 UTC
A flaw was found in Mozilla nss. Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The highest threat from this vulnerability is to data confidentiality.

References:

https://raccoon-attack.com/

Comment 1 Pedro Sampaio 2020-09-09 20:25:03 UTC
Created nss tracking bugs for this issue:

Affects: fedora-all [bug 1877558]

Comment 3 Todd Cullum 2020-09-15 19:23:11 UTC
Statement:

NSS as shipped with Red Hat Enterprise Linux 6, 7, and 8 does not re-use Diffie-Hellman Ephemeral (DHE) keys. It reuses Elliptic Curve Diffie-Hellman Ephemeral (ECDHE) keys by default, but Attacking ECDH and ECDHE cipher suites are not in the scope of the Raccoon Attack and generally considered to be unaffected [1]. Further, reuse of ECDHE keys can be disabled starting in nss 3.17 [2].

For these reasons, Red Hat Product Security has marked the Severity of this flaw as Low. Please see [3] for more information about Low Severity ratings.

1. https://raccoon-attack.com/RacoonAttack.pdf pg. 13
2. https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.17_release_notes
3. https://access.redhat.com/security/updates/classification

Comment 4 Todd Cullum 2020-09-15 19:26:22 UTC
External References:

Thorough Explanation can be found: https://raccoon-attack.com/RacoonAttack.pdf
Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E) by Robert Merget, Marcus Brinkmann, et al.

Comment 5 Todd Cullum 2020-09-15 19:31:41 UTC
Mitigation:

Any risk involving ECDHE key reuse on the nss server can be mitigated by setting the SSL_REUSE_SERVER_ECDHE_KEY socket option to PR_FALSE.


Note You need to log in before you can comment on or make changes to this bug.