CVE-2020-12403
Published: 18 August 2020
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
Priority
Status
Package | Release | Status |
---|---|---|
nss Launchpad, Ubuntu, Debian |
upstream |
Released
(3.55)
|
bionic |
Released
(2:3.35-2ubuntu2.12)
|
|
focal |
Released
(2:3.49.1-1ubuntu1.5)
|
|
trusty |
Released
(2:3.28.4-0ubuntu0.14.04.5+esm8)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
xenial |
Released
(2:3.28.4-0ubuntu0.16.04.14)
|
|
Patches: upstream: https://hg.mozilla.org/projects/nss/rev/f282556e6cc7715f5754aeaadda6f902590e7e38 upstream: https://hg.mozilla.org/projects/nss/rev/c25adfdfab34ddb08d3262aac3242e3399de1095 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.1 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H |