[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2023-2023-031 --- nss

ID: oval:org.secpod.oval:def:19500079Date: (C)2023-06-12   (M)2024-02-19
Class: PATCHFamily: unix




NSS up to and including 3.73 is vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS #7, or PKCS #12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS.When verifying a DER-encoded signature, NSS decodes the signature into a fixed-size buffer and passes the buffer to the underlying PKCS #11 module. The length of the signature is not correctly checked when processing DSA and RSA-PSS signatures. DSA and RSA-PSS signatures larger than 16384 bits will overflow the buffer in VFYContextStr. The vulnerable code is located within secvfy.c:vfy_CreateContext

Platform:
Amazon Linux 2023
Product:
nss
nspr
Reference:
ALAS2023-2023-031
CVE-2021-43527
CVE    1
CVE-2021-43527
CPE    2
cpe:/a:nss:network_security_services
cpe:/a:mozilla:netscape_portable_runtime

© SecPod Technologies