Уязвимость DoS атаки через использование элемента нулевой длины в ASN.1 декодере в Mozilla Network Security Services
Описание
Декодер ASN.1 в QuickDER в составе Mozilla Network Security Services (NSS) позволяет злоумышленникам вызвать DoS атаку (аварийное завершение работы приложения) через элемент нулевой длины. Это продемонстрировано с использованием (1) ограничения нулевой длины или (2) поля нулевой длины в ответе OCSP.
Затронутые версии ПО
- Firefox 4.x до 12.0
- Firefox ESR 10.x до 10.0.5
- Thunderbird 5.0 до 12.0
- Thunderbird ESR 10.x до 10.0.5
- SeaMonkey до 2.10
Тип уязвимости
DoS атака
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Одно из
EPSS
5 Medium
CVSS2
Дефекты
Связанные уязвимости
The ASN.1 decoder in the QuickDER decoder in Mozilla Network Security Services (NSS) before 3.13.4, as used in Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10, allows remote attackers to cause a denial of service (application crash) via a zero-length item, as demonstrated by (1) a zero-length basic constraint or (2) a zero-length field in an OCSP response.
The ASN.1 decoder in the QuickDER decoder in Mozilla Network Security Services (NSS) before 3.13.4, as used in Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10, allows remote attackers to cause a denial of service (application crash) via a zero-length item, as demonstrated by (1) a zero-length basic constraint or (2) a zero-length field in an OCSP response.
The ASN.1 decoder in the QuickDER decoder in Mozilla Network Security ...
The ASN.1 decoder in the QuickDER decoder in Mozilla Network Security Services (NSS) before 3.13.4, as used in Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10, allows remote attackers to cause a denial of service (application crash) via a zero-length item, as demonstrated by (1) a zero-length basic constraint or (2) a zero-length field in an OCSP response.
ELSA-2012-1091: nss, nspr, and nss-util security, bug fix, and enhancement update (MODERATE)
EPSS
5 Medium
CVSS2