Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-11695

Опубликовано: 27 дек. 2017
Источник: debian
EPSS Низкий

Описание

Heap-based buffer overflow in the alloc_segs function in lib/dbm/src/hash.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
nssunfixedpackage

Примечания

  • Issues triggered by crafted DBM databases, which would

  • require local user access to a machine running NSS and

  • crafting the local DBM files.

  • http://seclists.org/fulldisclosure/2017/Aug/17

  • https://bugzilla.mozilla.org/show_bug.cgi?id=1360782

EPSS

Процентиль: 25%
0.00088
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 8 лет назад

Heap-based buffer overflow in the alloc_segs function in lib/dbm/src/hash.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.

CVSS3: 7.5
redhat
больше 8 лет назад

Heap-based buffer overflow in the alloc_segs function in lib/dbm/src/hash.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.

CVSS3: 7.8
nvd
около 8 лет назад

Heap-based buffer overflow in the alloc_segs function in lib/dbm/src/hash.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.

CVSS3: 7.8
github
больше 3 лет назад

Heap-based buffer overflow in the alloc_segs function in lib/dbm/src/hash.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.

EPSS

Процентиль: 25%
0.00088
Низкий