Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-11698

Опубликовано: 27 дек. 2017
Источник: debian

Описание

Heap-based buffer overflow in the __get_page function in lib/dbm/src/h_page.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
nssunfixedpackage

Примечания

  • Issues triggered by crafted DBM databases, which would

  • require local user access to a machine running NSS and

  • crafting the local DBM files.

  • http://seclists.org/fulldisclosure/2017/Aug/17

  • https://bugzilla.mozilla.org/show_bug.cgi?id=1360779

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 8 лет назад

Heap-based buffer overflow in the __get_page function in lib/dbm/src/h_page.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.

CVSS3: 7.5
redhat
больше 8 лет назад

Heap-based buffer overflow in the __get_page function in lib/dbm/src/h_page.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.

CVSS3: 7.8
nvd
около 8 лет назад

Heap-based buffer overflow in the __get_page function in lib/dbm/src/h_page.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.

CVSS3: 7.8
github
больше 3 лет назад

Heap-based buffer overflow in the __get_page function in lib/dbm/src/h_page.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.