When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "libnss3-nssdb": "2:3.28.4-0ubuntu0.14.04.4", "libnss3-1d": "2:3.28.4-0ubuntu0.14.04.4", "libnss3-dbgsym": "2:3.28.4-0ubuntu0.14.04.4", "libnss3": "2:3.28.4-0ubuntu0.14.04.4", "libnss3-dev": "2:3.28.4-0ubuntu0.14.04.4", "libnss3-dbg": "2:3.28.4-0ubuntu0.14.04.4", "libnss3-tools": "2:3.28.4-0ubuntu0.14.04.4", "libnss3-tools-dbgsym": "2:3.28.4-0ubuntu0.14.04.4" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "libnss3-nssdb": "2:3.28.4-0ubuntu0.16.04.4", "libnss3-1d": "2:3.28.4-0ubuntu0.16.04.4", "libnss3-dbgsym": "2:3.28.4-0ubuntu0.16.04.4", "libnss3": "2:3.28.4-0ubuntu0.16.04.4", "libnss3-dev": "2:3.28.4-0ubuntu0.16.04.4", "libnss3-dbg": "2:3.28.4-0ubuntu0.16.04.4", "libnss3-tools": "2:3.28.4-0ubuntu0.16.04.4", "libnss3-tools-dbgsym": "2:3.28.4-0ubuntu0.16.04.4" } ] }