Lucene search

K
mozillaMozilla FoundationMFSA2014-73
HistorySep 24, 2014 - 12:00 a.m.

RSA Signature Forgery in NSS — Mozilla

2014-09-2400:00:00
Mozilla Foundation
www.mozilla.org
65

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.038

Percentile

91.9%

Antoine Delignat-Lavaud, security researcher at Inria Paris in team Prosecco, reported an issue in Network Security Services (NSS) libraries affecting all versions. He discovered that NSS is vulnerable to a variant of a signature forgery attack previously published by Daniel Bleichenbacher. This is due to lenient parsing of ASN.1 values involved in a signature and could lead to the forging of RSA certificates.

Affected configurations

Vulners
Node
mozillafirefoxRange<32.0.3
OR
mozillafirefox_esrRange<24.8.1
OR
mozillafirefox_esrRange<31.1.1
OR
mozillafirefox_osRange<2.2
OR
mozillanssRange<3.16.2.1
OR
mozillanssRange<3.16.5
OR
mozillanssRange<3.17.1
OR
mozillaseamonkeyRange<2.29.1
OR
mozillathunderbirdRange<24.8.1
OR
mozillathunderbirdRange<31.1.2

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.038

Percentile

91.9%