Vulnerability Name:

CVE-2013-1740

Assigned:2013-02-13
Published:2014-01-05
Updated:2017-11-14
Summary:The ssl_Do1stHandshake function in sslsecur.c in libssl in Mozilla Network Security Services (NSS) before 3.15.4, when the TLS False Start feature is enabled, allows man-in-the-middle attackers to spoof SSL servers by using an arbitrary X.509 certificate during certain handshake traffic.
CVSS v3 Severity:4.8 Medium (CCN CVSS v3 Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N)
4.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
4.3 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-310
References:Source: SUSE
Type: UNKNOWN
openSUSE-SU-2014:0212

Source: SUSE
Type: UNKNOWN
openSUSE-SU-2014:0213

Source: FULLDISC
Type: UNKNOWN
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

Source: BUGTRAQ
Type: UNKNOWN
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities

Source: BID
Type: UNKNOWN
64944

Source: UBUNTU
Type: UNKNOWN
USN-2088-1

Source: CONFIRM
Type: UNKNOWN
http://www.vmware.com/security/advisories/VMSA-2014-0012.html

Source: CONFIRM
Type: UNKNOWN
https://bugs.gentoo.org/show_bug.cgi?id=498172

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.mozilla.org/show_bug.cgi?id=919877

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=1053725

Source: CONFIRM
Type: UNKNOWN
https://developer.mozilla.org/docs/NSS/NSS_3.15.4_release_notes

Source: XF
Type: UNKNOWN
mozilla-nss-cve20131740-info-disc(90394)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20131740
    V
    CVE-2013-1740
    2017-11-19
    oval:org.mitre.oval:def:26451
    P
    RHSA-2014:1246: nss and nspr security, bug fix, and enhancement update (Moderate)
    2015-04-13
    oval:org.mitre.oval:def:27117
    P
    ELSA-2014-0917 -- nss and nspr security, bug fix, and enhancement update (critical)
    2014-12-15
    oval:org.mitre.oval:def:26119
    P
    ELSA-2014-1246 -- nss and nspr security, bug fix, and enhancement update (Moderate)
    2014-11-17
    oval:org.mitre.oval:def:26703
    P
    RHBA-2014:1047: nss nad nspr bug fix and enhancement update (Moderate)
    2014-10-27
    oval:com.redhat.rhsa:def:20141246
    P
    RHSA-2014:1246: nss and nspr security, bug fix, and enhancement update (Moderate)
    2014-09-16
    oval:org.mitre.oval:def:25116
    P
    RHSA-2014:0917: nss and nspr security, bug fix, and enhancement update (Critical)
    2014-09-08
    oval:com.redhat.rhsa:def:20140917
    P
    RHSA-2014:0917: nss and nspr security, bug fix, and enhancement update (Critical)
    2014-07-22
    oval:org.mitre.oval:def:22401
    P
    USN-2088-1 -- nss vulnerability
    2014-06-30
    oval:com.ubuntu.precise:def:20131740000
    V
    CVE-2013-1740 on Ubuntu 12.04 LTS (precise) - medium.
    2014-01-18
    BACK
    mozilla network_security_services 3.2
    mozilla network_security_services 3.2.1
    mozilla network_security_services 3.3
    mozilla network_security_services 3.3.1
    mozilla network_security_services 3.3.2
    mozilla network_security_services 3.4
    mozilla network_security_services 3.4.1
    mozilla network_security_services 3.4.2
    mozilla network_security_services 3.5
    mozilla network_security_services 3.6
    mozilla network_security_services 3.6.1
    mozilla network_security_services 3.7
    mozilla network_security_services 3.7.1
    mozilla network_security_services 3.7.2
    mozilla network_security_services 3.7.3
    mozilla network_security_services 3.7.5
    mozilla network_security_services 3.7.7
    mozilla network_security_services 3.8
    mozilla network_security_services 3.9
    mozilla network_security_services 3.11.2
    mozilla network_security_services 3.11.3
    mozilla network_security_services 3.11.4
    mozilla network_security_services 3.11.5
    mozilla network_security_services 3.12
    mozilla network_security_services 3.12.1
    mozilla network_security_services 3.12.2
    mozilla network_security_services 3.12.3
    mozilla network_security_services 3.12.3.1
    mozilla network_security_services 3.12.3.2
    mozilla network_security_services 3.12.4
    mozilla network_security_services 3.12.5
    mozilla network_security_services 3.12.6
    mozilla network_security_services 3.12.7
    mozilla network_security_services 3.12.8
    mozilla network_security_services 3.12.9
    mozilla network_security_services 3.12.10
    mozilla network_security_services 3.12.11
    mozilla network_security_services 3.14
    mozilla network_security_services 3.14.1
    mozilla network_security_services 3.14.2
    mozilla network_security_services 3.14.3
    mozilla network_security_services 3.14.4
    mozilla network_security_services 3.14.5
    mozilla network_security_services 3.15
    mozilla network_security_services 3.15.1
    mozilla network_security_services 3.15.2
    mozilla network_security_services 3.15.3
    redhat enterprise_linux 6
    redhat enterprise_linux 5