6.8
CVSSv2

CVE-2016-1979

Published: 13/03/2016 Updated: 04/11/2017
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Use-after-free vulnerability in the PK11_ImportDERPrivateKeyInfoAndReturnKey function in Mozilla Network Security Services (NSS) prior to 3.21.1, as used in Mozilla Firefox prior to 45.0, allows remote malicious users to cause a denial of service or possibly have unspecified other impact via crafted key data with DER encoding.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox

mozilla network_security_services

Vendor Advisories

Several security issues were fixed in Thunderbird ...
Multiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail client: Multiple memory safety errors may lead to the execution of arbitrary code or denial of service For the stable distribution (jessie), these problems have been fixed in version 3880-1~deb8u1 For the unstable distribution (sid), these prob ...
Several vulnerabilities were discovered in NSS, the cryptography library developed by the Mozilla project CVE-2015-4000 David Adrian et al reported that it may be feasible to attack Diffie-Hellman-based cipher suites in certain circumstances, compromising the confidentiality and integrity of data encrypted with Transport Layer Se ...
A use-after-free flaw was found in the way NSS handled DHE (DiffieHellman key exchange) and ECDHE (Elliptic Curve Diffie-Hellman key exchange) handshake messages A remote attacker could send a specially crafted handshake message that, when parsed by an application linked against NSS, would cause that application to crash or, under certain special ...
Mozilla Foundation Security Advisory 2016-36 Use-after-free during processing of DER encoded keys in NSS Announced March 8, 2016 Reporter Tim Taubert Impact High Products Firefox, Firefox ESR, NSS, Thunderbird Fixed in ...
A use-after-free flaw was found in the way NSS processed certain DER (Distinguished Encoding Rules) encoded cryptographic keys An attacker could use this flaw to create a specially crafted DER encoded certificate which, when parsed by an application compiled against the NSS library, could cause that application to crash, or execute arbitrary code ...