6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.01 Low
EPSS
Percentile
83.7%
Issue Overview:
A heap-based buffer overflow flaw was found in the way NSS parsed certain ASN.1 structures. An attacker could use this flaw to create a specially crafted certificate which, when parsed by NSS, could cause it to crash, or execute arbitrary code, using the permissions of the user running an application compiled against the NSS library.
Affected Packages:
nss-util
Issue Correction:
Run yum update nss-util to update your system.
New Packages:
i686:
nss-util-3.19.1-9.49.amzn1.i686
nss-util-devel-3.19.1-9.49.amzn1.i686
nss-util-debuginfo-3.19.1-9.49.amzn1.i686
src:
nss-util-3.19.1-9.49.amzn1.src
x86_64:
nss-util-3.19.1-9.49.amzn1.x86_64
nss-util-devel-3.19.1-9.49.amzn1.x86_64
nss-util-debuginfo-3.19.1-9.49.amzn1.x86_64
Red Hat: CVE-2016-1950
Mitre: CVE-2016-1950
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | nss-util | < 3.19.1-9.49.amzn1 | nss-util-3.19.1-9.49.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | nss-util-devel | < 3.19.1-9.49.amzn1 | nss-util-devel-3.19.1-9.49.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | nss-util-debuginfo | < 3.19.1-9.49.amzn1 | nss-util-debuginfo-3.19.1-9.49.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | nss-util | < 3.19.1-9.49.amzn1 | nss-util-3.19.1-9.49.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | nss-util-devel | < 3.19.1-9.49.amzn1 | nss-util-devel-3.19.1-9.49.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | nss-util-debuginfo | < 3.19.1-9.49.amzn1 | nss-util-debuginfo-3.19.1-9.49.amzn1.x86_64.rpm |
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.01 Low
EPSS
Percentile
83.7%