When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.
{
"binaries": [
{
"binary_name": "libnss3",
"binary_version": "2:3.28.4-0ubuntu0.14.04.4"
},
{
"binary_name": "libnss3-1d",
"binary_version": "2:3.28.4-0ubuntu0.14.04.4"
},
{
"binary_name": "libnss3-dev",
"binary_version": "2:3.28.4-0ubuntu0.14.04.4"
},
{
"binary_name": "libnss3-nssdb",
"binary_version": "2:3.28.4-0ubuntu0.14.04.4"
},
{
"binary_name": "libnss3-tools",
"binary_version": "2:3.28.4-0ubuntu0.14.04.4"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "libnss3",
"binary_version": "2:3.28.4-0ubuntu0.16.04.4"
},
{
"binary_name": "libnss3-1d",
"binary_version": "2:3.28.4-0ubuntu0.16.04.4"
},
{
"binary_name": "libnss3-dev",
"binary_version": "2:3.28.4-0ubuntu0.16.04.4"
},
{
"binary_name": "libnss3-nssdb",
"binary_version": "2:3.28.4-0ubuntu0.16.04.4"
},
{
"binary_name": "libnss3-tools",
"binary_version": "2:3.28.4-0ubuntu0.16.04.4"
}
],
"availability": "No subscription required"
}