Lucene search

K
mozillaMozilla FoundationMFSA2015-71
HistoryJul 02, 2015 - 12:00 a.m.

NSS incorrectly permits skipping of ServerKeyExchange — Mozilla

2015-07-0200:00:00
Mozilla Foundation
www.mozilla.org
46

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.001

Percentile

49.3%

Security researcher Karthikeyan Bhargavan reported an issue in Network Security Services (NSS) where the client allows for a ECDHE_ECDSA exchange where the server does not send its ServerKeyExchange message instead of aborting the handshake. Instead, the NSS client will take the EC key from the ECDSA certificate. This violates the TLS protocol and also has some security implications for forward secrecy. In this situation, the browser thinks it is engaged in an ECDHE exchange, but has been silently downgraded to a non-forward secret mixed-ECDH exchange instead. As a result, if False Start is enabled, the browser will start sending data encrypted under these non-forward-secret connection keys. This issue was fixed in NSS version 3.19.1.

Affected configurations

Vulners
Node
mozillafirefoxRange<39
OR
mozillafirefox_esrRange<31.8
OR
mozillafirefox_esrRange<38.1
OR
mozillafirefox_osRange<2.2
OR
mozillaseamonkeyRange<2.35
OR
mozillathunderbirdRange<31.8
OR
mozillathunderbirdRange<38.1

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.001

Percentile

49.3%