CVE-2019-11727
Published: 11 July 2019
A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox < 68.
Priority
CVSS 3 base score: 5.3
Status
Package | Release | Status |
---|---|---|
firefox Launchpad, Ubuntu, Debian |
Upstream |
Released
(68)
|
Ubuntu 21.04 (Hirsute Hippo) |
Released
(68.0+build3-0ubuntu1)
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Released
(68.0+build3-0ubuntu1)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Released
(68.0+build3-0ubuntu1)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(68.0+build3-0ubuntu0.18.04.1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(68.0+build3-0ubuntu0.16.04.1)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
mozjs38 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 21.04 (Hirsute Hippo) |
Does not exist
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Does not exist
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Does not exist
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Needs triage
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
mozjs52 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 21.04 (Hirsute Hippo) |
Does not exist
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Needs triage
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Needs triage
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Needs triage
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
mozjs60 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 21.04 (Hirsute Hippo) |
Does not exist
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Does not exist
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Does not exist
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
nss Launchpad, Ubuntu, Debian |
Upstream |
Released
(2:3.45-1)
|
Ubuntu 21.04 (Hirsute Hippo) |
Released
(2:3.45-1ubuntu1)
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Released
(2:3.45-1ubuntu1)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Released
(2:3.45-1ubuntu1)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(code not present)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
(code not present)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Not vulnerable
(code not present)
|
|
Patches: Upstream: https://hg.mozilla.org/projects/nss/rev/0a4e8b72a92e144663c2f35d3836f7828cfc97f2 |
||
thunderbird Launchpad, Ubuntu, Debian |
Upstream |
Needed
|
Ubuntu 21.04 (Hirsute Hippo) |
Not vulnerable
(1:68.5.0+build1-0ubuntu1)
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Not vulnerable
(1:68.5.0+build1-0ubuntu1)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Not vulnerable
(1:68.5.0+build1-0ubuntu1)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(1:68.4.1+build1-0ubuntu0.18.04.1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(1:68.7.0+build1-0ubuntu0.16.04.2)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
Notes
Author | Note |
---|---|
mdeslaur | only an issue with TLSv1.3. Releases before Bionic have no TLSv1.3 support. Bionic shipped with an incompatible TLSv1.3 draft, so likely not used. |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727
- https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727
- https://usn.ubuntu.com/usn/usn-4054-1
- https://usn.ubuntu.com/usn/usn-4060-1
- NVD
- Launchpad
- Debian