Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.
lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
lists.opensuse.org/opensuse-updates/2015-12/msg00139.html
lists.opensuse.org/opensuse-updates/2016-01/msg00005.html
lists.opensuse.org/opensuse-updates/2016-01/msg00058.html
lists.opensuse.org/opensuse-updates/2016-01/msg00059.html
lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
lists.opensuse.org/opensuse-updates/2016-02/msg00166.html
rhn.redhat.com/errata/RHSA-2016-0049.html
rhn.redhat.com/errata/RHSA-2016-0050.html
rhn.redhat.com/errata/RHSA-2016-0053.html
rhn.redhat.com/errata/RHSA-2016-0054.html
rhn.redhat.com/errata/RHSA-2016-0055.html
rhn.redhat.com/errata/RHSA-2016-0056.html
www.debian.org/security/2016/dsa-3436
www.debian.org/security/2016/dsa-3437
www.debian.org/security/2016/dsa-3457
www.debian.org/security/2016/dsa-3458
www.debian.org/security/2016/dsa-3465
www.debian.org/security/2016/dsa-3491
www.debian.org/security/2016/dsa-3688
www.mozilla.org/security/announce/2015/mfsa2015-150.html
www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
www.securityfocus.com/bid/79684
www.securityfocus.com/bid/91787
www.securitytracker.com/id/1034541
www.securitytracker.com/id/1036467
www.ubuntu.com/usn/USN-2863-1
www.ubuntu.com/usn/USN-2864-1
www.ubuntu.com/usn/USN-2865-1
www.ubuntu.com/usn/USN-2866-1
www.ubuntu.com/usn/USN-2884-1
www.ubuntu.com/usn/USN-2904-1
access.redhat.com/errata/RHSA-2016:1430
bugzilla.mozilla.org/show_bug.cgi?id=1158489
developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes
security.gentoo.org/glsa/201701-46
security.gentoo.org/glsa/201706-18
security.gentoo.org/glsa/201801-15
security.netapp.com/advisory/ntap-20160225-0001/