Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2016-0371

Опубликовано: 09 мар. 2016
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2016-0371: nss security update (CRITICAL)

[3.19.1-4]

  • Actually apply the fix for CVE-2016-1950 from NSS 3.19.2.3 ...

[3.19.1-3]

  • Include the fix for CVE-2016-1950 from NSS 3.19.2.3

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

nss

3.19.1-4.el5_11

nss-devel

3.19.1-4.el5_11

nss-pkcs11-devel

3.19.1-4.el5_11

nss-tools

3.19.1-4.el5_11

Oracle Linux x86_64

nss

3.19.1-4.el5_11

nss-devel

3.19.1-4.el5_11

nss-pkcs11-devel

3.19.1-4.el5_11

nss-tools

3.19.1-4.el5_11

Oracle Linux i386

nss

3.19.1-4.el5_11

nss-devel

3.19.1-4.el5_11

nss-pkcs11-devel

3.19.1-4.el5_11

nss-tools

3.19.1-4.el5_11

Связанные CVE

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 9 лет назад

Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.

redhat
больше 9 лет назад

Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.

CVSS3: 8.8
nvd
больше 9 лет назад

Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.

CVSS3: 8.8
debian
больше 9 лет назад

Heap-based buffer overflow in Mozilla Network Security Services (NSS) ...

CVSS3: 8.8
github
больше 3 лет назад

Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.