Lucene search

K
mozillaMozilla FoundationMFSA2015-70
HistoryJul 02, 2015 - 12:00 a.m.

NSS accepts export-length DHE keys with regular DHE cipher suites — Mozilla

2015-07-0200:00:00
Mozilla Foundation
www.mozilla.org
54

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

3.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

0.974 High

EPSS

Percentile

99.9%

Security researcher Matthew Green reported a Diffie–Hellman (DHE) key processing issue in Network Security Services (NSS) where a man-in-the-middle (MITM) attacker can force a server to downgrade TLS connections to 512-bit export-grade cryptography by modifying client requests to include only export-grade cipher suites. The resulting weak key can then be leveraged to impersonate the server. This attack is detailed in the “Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice” paper and is known as the “Logjam Attack.”

Affected configurations

Vulners
Node
mozillafirefoxRange<39
OR
mozillafirefox_esrRange<31.8
OR
mozillafirefox_esrRange<38.1
OR
mozillafirefox_osRange<2.2
OR
mozillaseamonkeyRange<2.35
OR
mozillathunderbirdRange<31.8
OR
mozillathunderbirdRange<38.1

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

3.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

0.974 High

EPSS

Percentile

99.9%