CVE-2013-1740

NameCVE-2013-1740
DescriptionThe ssl_Do1stHandshake function in sslsecur.c in libssl in Mozilla Network Security Services (NSS) before 3.15.4, when the TLS False Start feature is enabled, allows man-in-the-middle attackers to spoof SSL servers by using an arbitrary X.509 certificate during certain handshake traffic.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
nss (PTS)jessie (security), jessie2:3.26-1+debu8u3fixed
stretch (security), stretch2:3.26.2-1.1+deb9u1fixed
buster, sid2:3.39-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
nsssource(unstable)2:3.15.4-1medium

Notes

[squeeze] - nss <no-dsa> (false start disabled by default, needs to be enabled by clients)
[wheezy] - nss <no-dsa> (false start disabled by default, needs to be enabled by clients)
false start must be enabled by the client (mainly browsers)

Search for package or bug name: Reporting problems