vulnerability
Red Hat: CVE-2019-11727: CVE-2019-11727 nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Jul 23, 2019 | Jul 31, 2019 | Jul 9, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Jul 23, 2019
Added
Jul 31, 2019
Modified
Jul 9, 2025
Description
A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox
Solution(s)
no-fix-redhat-rpm-packageredhat-upgrade-nsprredhat-upgrade-nspr-debuginforedhat-upgrade-nspr-debugsourceredhat-upgrade-nspr-develredhat-upgrade-nssredhat-upgrade-nss-debuginforedhat-upgrade-nss-debugsourceredhat-upgrade-nss-develredhat-upgrade-nss-pkcs11-develredhat-upgrade-nss-softoknredhat-upgrade-nss-softokn-debuginforedhat-upgrade-nss-softokn-develredhat-upgrade-nss-softokn-freeblredhat-upgrade-nss-softokn-freebl-debuginforedhat-upgrade-nss-softokn-freebl-develredhat-upgrade-nss-sysinitredhat-upgrade-nss-sysinit-debuginforedhat-upgrade-nss-toolsredhat-upgrade-nss-tools-debuginforedhat-upgrade-nss-utilredhat-upgrade-nss-util-debuginforedhat-upgrade-nss-util-devel

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.