668
VMScore

CVE-2015-7182

Published: 05/11/2015 Updated: 04/11/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) prior to 3.19.2.1 and 3.20.x prior to 3.20.1, as used in Firefox prior to 42.0 and Firefox ESR 38.x prior to 38.4 and other products, allows remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oracle traffic director 11.1.1.9.0

oracle traffic director 11.1.1.7.0

oracle opensso 3.0-0.7

oracle iplanet web proxy server 4.0

mozilla firefox esr 38.0

mozilla firefox esr 38.0.1

mozilla firefox esr 38.2.1

mozilla firefox esr 38.3.0

mozilla firefox esr 38.1.1

mozilla firefox esr 38.2.0

mozilla firefox esr 38.0.5

mozilla firefox esr 38.1.0

oracle glassfish server 2.1.1

mozilla network security services 3.20.0

mozilla network security services

oracle iplanet web server 7.0

mozilla firefox

Vendor Advisories

NSS could be made to crash or run programs if it received specially crafted input ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Several security issues were fixed in Thunderbird ...
Multiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail client: Multiple memory safety errors, integer overflows, buffer overflows and other implementation errors may lead to the execution of arbitrary code or denial of service For the oldstable distribution (wheezy), these problems have been fixed in ...
Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, integer overflows, buffer overflows and other implementation errors may lead to the execution of arbitrary code, information disclosure or denial of service For the oldstable distribution (wheezy), these proble ...
Several vulnerabilities were discovered in NSS, the cryptography library developed by the Mozilla project CVE-2015-4000 David Adrian et al reported that it may be feasible to attack Diffie-Hellman-based cipher suites in certain circumstances, compromising the confidentiality and integrity of data encrypted with Transport Layer Se ...
Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities A use-after-poison flaw and a heap-based buffer overflow flaw were found in the way NSS par ...
Mozilla Foundation Security Advisory 2015-133 NSS and NSPR memory corruption issues Announced November 3, 2015 Reporter Tyson Smith, David Keeler, Ryan Sleevi Impact Critical Products Firefox, Firefox ESR, Thunderbird ...
A heap-based buffer overflow flaw was found in the way NSS parsed certain ASN1 structures An attacker could use this flaw to cause NSS to crash or execute arbitrary code with the permissions of the user running an application compiled against the NSS library ...

Recent Articles

Firefox 42 ... answer to the ultimate question of life, security bugs and fully private browsing?
The Register • Shaun Nichols in San Francisco • 04 Nov 2015

SSL/TLS library flaws found, anti-analytics missiles deployed

Mozilla has released Firefox 42 and Firefox ESR 38 38.4, which include fixes for worrying security vulnerabilities in the web browser. The November 3 update squashes at least three bugs that can be potentially exploited to achieve remote code execution. Two Mozilla engineers, Tyson Smith and David Keeler, uncovered two flaws (CVE-2015-7181 and CVE-2015-7182) in NSS, a toolkit used by Firefox to encrypt web traffic over SSL/TLS. By exploiting "a use-after-poison and buffer overflow in the ASN.1 d...

References

CWE-119https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_noteshttp://www.mozilla.org/security/announce/2015/mfsa2015-133.htmlhttps://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_noteshttps://bugzilla.mozilla.org/show_bug.cgi?id=1202868https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_noteshttp://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlhttp://www.securityfocus.com/bid/91787http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.htmlhttp://www.securityfocus.com/bid/77416https://security.gentoo.org/glsa/201605-06https://bto.bluecoat.com/security-advisory/sa119http://rhn.redhat.com/errata/RHSA-2015-1980.htmlhttp://www.ubuntu.com/usn/USN-2791-1http://www.debian.org/security/2015/dsa-3410http://www.debian.org/security/2015/dsa-3393http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.htmlhttp://www.ubuntu.com/usn/USN-2785-1http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.htmlhttp://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1981.htmlhttp://www.securitytracker.com/id/1034069http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.htmlhttps://security.gentoo.org/glsa/201512-10http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.htmlhttp://www.ubuntu.com/usn/USN-2819-1http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.htmlhttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlhttp://www.debian.org/security/2016/dsa-3688https://nvd.nist.govhttps://usn.ubuntu.com/2791-1/