When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.
{
"binaries": [
{
"binary_version": "2:3.28.4-0ubuntu0.14.04.4",
"binary_name": "libnss3"
},
{
"binary_version": "2:3.28.4-0ubuntu0.14.04.4",
"binary_name": "libnss3-1d"
},
{
"binary_version": "2:3.28.4-0ubuntu0.14.04.4",
"binary_name": "libnss3-dev"
},
{
"binary_version": "2:3.28.4-0ubuntu0.14.04.4",
"binary_name": "libnss3-nssdb"
},
{
"binary_version": "2:3.28.4-0ubuntu0.14.04.4",
"binary_name": "libnss3-tools"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_version": "2:3.28.4-0ubuntu0.16.04.4",
"binary_name": "libnss3"
},
{
"binary_version": "2:3.28.4-0ubuntu0.16.04.4",
"binary_name": "libnss3-1d"
},
{
"binary_version": "2:3.28.4-0ubuntu0.16.04.4",
"binary_name": "libnss3-dev"
},
{
"binary_version": "2:3.28.4-0ubuntu0.16.04.4",
"binary_name": "libnss3-nssdb"
},
{
"binary_version": "2:3.28.4-0ubuntu0.16.04.4",
"binary_name": "libnss3-tools"
}
],
"availability": "No subscription required"
}