[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2020-1384 --- nss

ID: oval:org.secpod.oval:def:1700297Date: (C)2020-01-25   (M)2024-04-17
Class: PATCHFamily: unix




A heap-based buffer overflow was found in the NSC_EncryptUpdate function in Mozilla nss. A remote attacker could trigger this flaw via SRTP encrypt or decrypt operations, to execute arbitrary code with the permissions of the user running the application . While the attack complexity is high, the impact to confidentiality, integrity, and availability are high as well. Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR lt; 60.8, Firefox lt; 68, and Thunderbird lt; 60.8

Platform:
Amazon Linux 2
Product:
nss
Reference:
ALAS2-2020-1384
CVE-2019-11745
CVE-2019-11729
CVE    2
CVE-2019-11729
CVE-2019-11745
CPE    2
cpe:/a:nss:network_security_services
cpe:/o:amazon:linux:2

© SecPod Technologies