CVE-2018-12384

When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:45

Type Values Removed Values Added
References () https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-12384 - Issue Tracking, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-12384 - Issue Tracking, Vendor Advisory
References () https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html - () https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -

Information

Published : 2019-04-29 15:29

Updated : 2024-11-21 03:45


NVD link : CVE-2018-12384

Mitre link : CVE-2018-12384

CVE.ORG link : CVE-2018-12384


JSON object : View

Products Affected

mozilla

  • network_security_services
CWE
CWE-335

Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)