#VU47195 Improper Certificate Validation in Mozilla NSS - CVE-2019-11727
Published: July 23, 2019 / Updated: September 30, 2020
Mozilla NSS
Mozilla
Description
The vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists doe to an error within the Mozilla NSS library, when working with TLS certificates. A remote attacker can force Network Security Services (NSS) to sign CertificateVerify with
PKCS#1 v1.5 signatures when those are the only ones advertised by server
in CertificateRequest in TLS 1.3. A remote attacker can perform a Man-in-the-Middle attack and gain access to sensitive information.
Remediation
External links
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
- https://access.redhat.com/errata/RHSA-2019:1951
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552208
- https://security.gentoo.org/glsa/201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/