A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system availability. This flaw affects NSS versions before 3.58.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 05:18
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=1887319 - Issue Tracking, Third Party Advisory | |
| References | () https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes - Release Notes, Vendor Advisory | |
| References | () https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E - | |
| References | () https://lists.debian.org/debian-lts-announce/2023/10/msg00039.html - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/ - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/ - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/ - | |
| References | () https://www.oracle.com//security-alerts/cpujul2021.html - Patch, Third Party Advisory | |
| References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Not Applicable, Third Party Advisory | |
| References | () https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory |
10 May 2022, 15:45
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html - Not Applicable, Third Party Advisory |
20 Apr 2022, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
07 Dec 2021, 19:58
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.3.0:*:*:*:*:*:*:* |
|
| References | (N/A) https://www.oracle.com//security-alerts/cpujul2021.html - Patch, Third Party Advisory | |
| References | (MISC) https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory |
20 Oct 2021, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2020-10-20 22:15
Updated : 2024-11-21 05:18
NVD link : CVE-2020-25648
Mitre link : CVE-2020-25648
CVE.ORG link : CVE-2020-25648
JSON object : View
Products Affected
mozilla
- network_security_services
oracle
- communications_offline_mediation_controller
- communications_pricing_design_center
- jd_edwards_enterpriseone_tools
fedoraproject
- fedora
redhat
- enterprise_linux
CWE
CWE-770
Allocation of Resources Without Limits or Throttling
