Lucene search

K
mozillaMozilla FoundationMFSA2012-39
HistoryJun 05, 2012 - 12:00 a.m.

NSS parsing errors with zero length items — Mozilla

2012-06-0500:00:00
Mozilla Foundation
www.mozilla.org
25

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.104 Low

EPSS

Percentile

95.0%

Security researcher Kaspar Brand found a flaw in how the Network Security Services (NSS) ASN.1 decoder handles zero length items. Effects of this issue depend on the field. One known symptom is an unexploitable crash in handling OCSP responses. NSS also mishandles zero-length basic constraints, assuming default values for some types that should be rejected as malformed. These issues have been addressed in NSS 3.13.4, which is now being used by Mozilla.

Affected configurations

Vulners
Node
mozillafirefoxRange<13
OR
mozillafirefox_esrRange<10.0.5
OR
mozillaseamonkeyRange<2.10
OR
mozillathunderbirdRange<13
OR
mozillathunderbird_esrRange<10.0.5

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.104 Low

EPSS

Percentile

95.0%