Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2014-1544

Опубликовано: 23 июл. 2014
Источник: nvd
CVSS2: 10
EPSS Низкий

Уязвимость повреждения памяти в функции CERT_DestroyCertificate библиотеки libnss3.so в Mozilla Network Security Services (NSS), позволяющая удалённо выполнять произвольный код

Описание

Уязвимость типа "use-after-free" в функции CERT_DestroyCertificate в библиотеке libnss3.so в составе Mozilla Network Security Services (NSS) позволяет удалённым злоумышленникам выполнять произвольный код. Уязвимость возникает из-за некорректного удаления структуры NSSCertificate из доверенного домена.

Затронутые версии ПО

  • Firefox версий до 31.0
  • Firefox ESR 24.x до 24.7
  • Thunderbird версий до 24.7

Тип уязвимости

  • Выполнение произвольного кода

Дополнительная информация

  • Подробности об уязвимости "use-after-free" можно найти по ссылке: CWE-416: Use After Free

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
Версия до 30.0 (включая)
cpe:2.3:a:mozilla:firefox:24.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:24.1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:24.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:24.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:24.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:24.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.11.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.11.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.11.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.11.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.14.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.14.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.15.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.15.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.15.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.15.3.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.15.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.15.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.16:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
Версия до 24.6 (включая)
cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*

EPSS

Процентиль: 87%
0.03216
Низкий

10 Critical

CVSS2

Дефекты

NVD-CWE-Other

Связанные уязвимости

ubuntu
около 11 лет назад

Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger certain improper removal of an NSSCertificate structure from a trust domain.

redhat
около 11 лет назад

Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger certain improper removal of an NSSCertificate structure from a trust domain.

debian
около 11 лет назад

Use-after-free vulnerability in the CERT_DestroyCertificate function i ...

github
около 3 лет назад

Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger certain improper removal of an NSSCertificate structure from a trust domain.

oracle-oval
около 11 лет назад

ELSA-2014-0916: nss and nspr security update (CRITICAL)

EPSS

Процентиль: 87%
0.03216
Низкий

10 Critical

CVSS2

Дефекты

NVD-CWE-Other