668
VMScore

CVE-2015-7182

Published: 05/11/2015 Updated: 04/11/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) prior to 3.19.2.1 and 3.20.x prior to 3.20.1, as used in Firefox prior to 42.0 and Firefox ESR 38.x prior to 38.4 and other products, allows remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.

Vulnerability Trend

Vendor Advisories

NSS could be made to crash or run programs if it received specially crafted input ...
A heap-based buffer overflow flaw was found in the way NSS parsed certain ASN1 structures An attacker could use this flaw to cause NSS to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSS library ...
Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities A use-after-poison flaw and a heap-based buffer overflow flaw were found in the way NSS par ...
NSS and NSPR memory corruption issues Announced November 3, 2015 Reporter Tyson Smith, David Keeler, Ryan Sleevi Impact Critical Products Firefox, Firefox ESR, Thunderbird Fixed in ...
<!-- Start - Changes for Security Advisory Channel --> Security Advisory ID SYMSA1355 Initial Publication Date: Advisory Status: Advisory Severity: CVSS Base Score: Legacy ID 22 Mar 2016 Open High CVSS v2: 75 SA119 ...
Several security issues were fixed in Thunderbird ...
Several vulnerabilities were discovered in NSS, the cryptography library developed by the Mozilla project CVE-2015-4000 David Adrian et al reported that it may be feasible to attack Diffie-Hellman-based cipher suites in certain circumstances, compromising the confidentiality and integrity of data encrypted with Transport Layer Se ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, integer overflows, buffer overflows and other implementation errors may lead to the execution of arbitrary code, information disclosure or denial of service For the oldstable distribution (wheezy), these proble ...
Multiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail client: Multiple memory safety errors, integer overflows, buffer overflows and other implementation errors may lead to the execution of arbitrary code or denial of service For the oldstable distribution (wheezy), these problems have been fixed in ...

Recent Articles

Firefox 42 ... answer to the ultimate question of life, security bugs and fully private browsing?
The Register • Shaun Nichols in San Francisco • 04 Nov 2015

SSL/TLS library flaws found, anti-analytics missiles deployed

Mozilla has released Firefox 42 and Firefox ESR 38 38.4, which include fixes for worrying security vulnerabilities in the web browser.
The November 3 update squashes at least three bugs that can be potentially exploited to achieve remote code execution.
Two Mozilla engineers, Tyson Smith and David Keeler, uncovered two flaws (CVE-2015-7181 and CVE-2015-7182) in NSS, a toolkit used by Firefox to encrypt web traffic over SSL/TLS.
By exploiting "a use-after-poison and buffer overf...

References

CWE-119http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.htmlhttp://lists.opensuse.org/opensuse-updates/2015-12/msg00037.htmlhttp://lists.opensuse.org/opensuse-updates/2015-12/msg00049.htmlhttp://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1980.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1981.htmlhttp://www.debian.org/security/2015/dsa-3393http://www.debian.org/security/2015/dsa-3410http://www.debian.org/security/2016/dsa-3688http://www.mozilla.org/security/announce/2015/mfsa2015-133.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.htmlhttp://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.htmlhttp://www.securityfocus.com/bid/77416http://www.securityfocus.com/bid/91787http://www.securitytracker.com/id/1034069http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753http://www.ubuntu.com/usn/USN-2785-1http://www.ubuntu.com/usn/USN-2791-1http://www.ubuntu.com/usn/USN-2819-1https://bto.bluecoat.com/security-advisory/sa119https://bugzilla.mozilla.org/show_bug.cgi?id=1202868https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_noteshttps://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_noteshttps://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_noteshttps://security.gentoo.org/glsa/201512-10https://security.gentoo.org/glsa/201605-06https://nvd.nist.govhttps://usn.ubuntu.com/2791-1/https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2015-7182https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2015-1981http://tools.cisco.com/security/center/viewAlert.x?alertId=41924