Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2019-17023

Published: 8 January 2020

After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored. This vulnerability affects Firefox < 72.

Notes

AuthorNote
mdeslaur
nss in xenial is built with NSS_DISABLE_TLS_1_3, so this issue
doesn't affect it.

Priority

Low

Cvss 3 Severity Score

6.5

Score breakdown

Status

Package Release Status
firefox
Launchpad, Ubuntu, Debian
bionic
Released (72.0.1+build1-0ubuntu0.18.04.1)
disco
Released (72.0.1+build1-0ubuntu0.19.04.1)
eoan
Released (72.0.1+build1-0ubuntu0.19.10.1)
focal
Released (72.0.1+build1-0ubuntu1)
trusty Does not exist

upstream
Released (72.0)
xenial
Released (72.0.1+build1-0ubuntu0.16.04.1)
nss
Launchpad, Ubuntu, Debian
bionic
Released (2:3.35-2ubuntu2.8)
disco Ignored
(end of life)
eoan
Released (2:3.45-1ubuntu2.3)
focal Not vulnerable
(2:3.49.1-1ubuntu1)
trusty Not vulnerable

upstream
Released (2:3.49-1)
xenial Not vulnerable
(code not compiled)
Patches:
upstream: https://hg.mozilla.org/projects/nss/rev/d64102b76a437f24d98a20480dcc9f1655143e7c
upstream: https://hg.mozilla.org/projects/nss/rev/8a2bd40e7f89a796cf24a0ff7cfb67c6e69c5c78

Severity score breakdown

Parameter Value
Base score 6.5
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality None
Integrity impact High
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N