CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
94.7%
Debian LTS Advisory DLA-2388-1 [email protected]
https://www.debian.org/lts/security/ Adrian Bunk
September 29, 2020 https://wiki.debian.org/LTS
Package : nss
Version : 2:3.26.2-1.1+deb9u2
CVE ID : CVE-2018-12404 CVE-2018-18508 CVE-2019-11719 CVE-2019-11729
CVE-2019-11745 CVE-2019-17006 CVE-2019-17007 CVE-2020-6829
CVE-2020-12399 CVE-2020-12400 CVE-2020-12401 CVE-2020-12402
CVE-2020-12403
Debian Bug : 921614 961752 963152
Various vulnerabilities were fixed in nss,
the Network Security Service libraries.
CVE-2018-12404
Cache side-channel variant of the Bleichenbacher attack.
CVE-2018-18508
NULL pointer dereference in several CMS functions resulting in a
denial of service.
CVE-2019-11719
Out-of-bounds read when importing curve25519 private key.
CVE-2019-11729
Empty or malformed p256-ECDH public keys may trigger a segmentation
fault.
CVE-2019-11745
Out-of-bounds write when encrypting with a block cipher.
CVE-2019-17006
Some cryptographic primitives did not check the length of the input
text, potentially resulting in overflows.
CVE-2019-17007
Handling of Netscape Certificate Sequences may crash with a NULL
dereference leading to a denial of service.
CVE-2020-12399
Force a fixed length for DSA exponentiation.
CVE-2020-6829
CVE-2020-12400
Side channel attack on ECDSA signature generation.
CVE-2020-12401
ECDSA timing attack mitigation bypass.
CVE-2020-12402
Side channel vulnerabilities during RSA key generation.
CVE-2020-12403
CHACHA20-POLY1305 decryption with undersized tag leads to
out-of-bounds read.
For Debian 9 stretch, these problems have been fixed in version
2:3.26.2-1.1+deb9u2.
We recommend that you upgrade your nss packages.
For the detailed security status of nss please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/nss
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | all | thunderbird-l10n-fi | < 1:60.8.0-1~deb9u1 | thunderbird-l10n-fi_1:60.8.0-1~deb9u1_all.deb |
Debian | 8 | armhf | libnss3-tools | < 2:3.26-1+debu8u5 | libnss3-tools_2:3.26-1+debu8u5_armhf.deb |
Debian | 9 | all | thunderbird | < 1:60.8.0-1~deb9u1 | thunderbird_1:60.8.0-1~deb9u1_all.deb |
Debian | 10 | all | lightning-l10n-ga-ie | < 1:60.8.0-1~deb10u1 | lightning-l10n-ga-ie_1:60.8.0-1~deb10u1_all.deb |
Debian | 9 | all | iceowl-l10n-et | < 1:60.8.0-1~deb9u1 | iceowl-l10n-et_1:60.8.0-1~deb9u1_all.deb |
Debian | 9 | all | iceowl-l10n-eu | < 1:60.8.0-1~deb9u1 | iceowl-l10n-eu_1:60.8.0-1~deb9u1_all.deb |
Debian | 9 | all | firefox-esr-l10n-en-gb | < 60.8.0esr-1~deb9u1 | firefox-esr-l10n-en-gb_60.8.0esr-1~deb9u1_all.deb |
Debian | 9 | all | lightning-l10n-en-gb | < 1:60.8.0-1~deb9u1 | lightning-l10n-en-gb_1:60.8.0-1~deb9u1_all.deb |
Debian | 9 | all | firefox-esr-l10n-az | < 60.8.0esr-1~deb9u1 | firefox-esr-l10n-az_60.8.0esr-1~deb9u1_all.deb |
Debian | 9 | all | iceweasel-l10n-te | < 1:60.8.0esr-1~deb9u1 | iceweasel-l10n-te_1:60.8.0esr-1~deb9u1_all.deb |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
94.7%