Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-25648
HistoryOct 20, 2020 - 12:00 a.m.

CVE-2020-25648

2020-10-2000:00:00
ubuntu.com
ubuntu.com
10

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.007 Low

EPSS

Percentile

80.2%

A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in
TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages,
causing a denial of service for servers compiled with the NSS library. The
highest threat from this vulnerability is to system availability. This flaw
affects NSS versions before 3.58.

Bugs

Notes

Author Note
leosilva From SUSE and Rhel: This issue affects servers which are compiled against the NSS library. Other consumers of NSS like firefox etc are not affected by this flaw.
eslerm CCS handling introduced after 3.28.4 with revision c3eba3a9483abede4c35fa92b5c950a35cd9b639 and others
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchnss< 2:3.35-2ubuntu2.14UNKNOWN
ubuntu20.04noarchnss< 2:3.49.1-1ubuntu1.7UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.007 Low

EPSS

Percentile

80.2%