Details
Richard Moore discovered that NSS would sometimes incorrectly match an SSL
certificate which had a Common Name that used a wildcard followed by a partial
IP address. While it is very unlikely that a Certificate Authority would issue
such a certificate, if an attacker were able to perform a machine-in-the-middle
attack, this flaw could be exploited to view sensitive information.
(CVE-2010-3170)
Nelson Bolyard discovered a weakness in the Diffie-Hellman Ephemeral mode
(DHE) key exchange implementation which allowed servers to use a too small
key length. (CVE-2010-3173)
Richard Moore discovered that NSS would sometimes incorrectly match an SSL
certificate which had a Common Name that used a wildcard followed by a partial
IP address. While it is very unlikely that a Certificate Authority would issue
such a certificate, if an attacker were able to perform a machine-in-the-middle
attack, this flaw could be exploited to view sensitive information.
(CVE-2010-3170)
Nelson Bolyard discovered a weakness in the Diffie-Hellman Ephemeral mode
(DHE) key exchange implementation which allowed servers to use a too small
key length. (CVE-2010-3173)
Update instructions
After a standard system update you need to restart any applications that use NSS, such as Firefox, Thunderbird or Evolution, to make all the necessary changes. This update also includes updated NSPR packages to work with the new NSS.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
9.10 karmic | libnss3-1d – 3.12.8-0ubuntu0.9.10.1 | ||
9.04 jaunty | libnss3-1d – 3.12.8-0ubuntu0.9.04.1 | ||
8.04 hardy | libnss3-1d – 3.12.8-0ubuntu0.8.04.1 | ||
10.10 maverick | libnss3-1d – 3.12.8-0ubuntu0.10.10.1 | ||
10.04 lucid | libnss3-1d – 3.12.8-0ubuntu0.10.04.1 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.