Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-1950

Опубликовано: 08 мар. 2016
Источник: redhat
CVSS2: 6.8
EPSS Низкий

Описание

Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.

A heap-based buffer overflow flaw was found in the way NSS parsed certain ASN.1 structures. An attacker could use this flaw to create a specially crafted certificate which, when parsed by NSS, could cause it to crash, or execute arbitrary code, using the permissions of the user running an application compiled against the NSS library.

Дополнительная информация

Статус:

Critical
https://bugzilla.redhat.com/show_bug.cgi?id=1310509nss: Heap buffer overflow vulnerability in ASN1 certificate parsing (MFSA 2016-35)

EPSS

Процентиль: 83%
0.01867
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 10 лет назад

Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.

CVSS3: 8.8
nvd
почти 10 лет назад

Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.

CVSS3: 8.8
debian
почти 10 лет назад

Heap-based buffer overflow in Mozilla Network Security Services (NSS) ...

CVSS3: 8.8
github
больше 3 лет назад

Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.

oracle-oval
почти 10 лет назад

ELSA-2016-0371: nss security update (CRITICAL)

EPSS

Процентиль: 83%
0.01867
Низкий

6.8 Medium

CVSS2