Mozilla Network Security Services 3.21.2

CPE Details

Mozilla Network Security Services 3.21.2
3.21.2
2018-08-09
09h58 +00:00
2018-08-09
09h58 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:mozilla:network_security_services:3.21.2:*:*:*:*:*:*:*

Informations

Vendor

mozilla

Product

network_security_services

Version

3.21.2

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2019-17007 2020-10-22 18h28 +00:00 In Network Security Services before 3.44, a malformed Netscape Certificate Sequence can cause NSS to crash, resulting in a denial of service.
7.5
Haute
CVE-2019-17006 2020-10-22 18h24 +00:00 In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
9.8
Critique
CVE-2018-18508 2020-10-22 18h14 +00:00 In Network Security Services (NSS) before 3.36.7 and before 3.41.1, a malformed signature can cause a crash due to a null dereference, resulting in a Denial of Service.
6.5
Moyen
CVE-2020-25648 2020-10-19 22h00 +00:00 A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system availability. This flaw affects NSS versions before 3.58.
7.5
Haute
CVE-2018-12404 2019-05-02 14h40 +00:00 A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41.
5.9
Moyen
CVE-2018-12384 2019-04-29 12h22 +00:00 When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.
5.9
Moyen
CVE-2016-8635 2018-08-01 11h00 +00:00 It was found that Diffie Hellman Client key exchange handling in NSS 3.21.x was vulnerable to small subgroup confinement attack. An attacker could use this flaw to recover private keys by confining the client DH key to small subgroup of the desired group.
5.9
Moyen
CVE-2016-9574 2018-07-19 11h00 +00:00 nss before version 3.30 is vulnerable to a remote denial of service during the session handshake when using SessionTicket extension and ECDHE-ECDSA.
5.9
Moyen
CVE-2017-5462 2018-06-11 19h00 +00:00 A flaw in DRBG number generation within the Network Security Services (NSS) library where the internal state V does not correctly carry bits over. The NSS library has been updated to fix this issue to address this issue and Firefox ESR 52.1 has been updated with NSS version 3.28.4. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
5.3
Moyen
CVE-2017-5461 2017-05-10 23h00 +00:00 Mozilla Network Security Services (NSS) before 3.21.4, 3.22.x through 3.28.x before 3.28.4, 3.29.x before 3.29.5, and 3.30.x before 3.30.1 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by leveraging incorrect base64 operations.
9.8
Critique
CVE-2016-2834 2016-06-13 08h00 +00:00 Mozilla Network Security Services (NSS) before 3.23, as used in Mozilla Firefox before 47.0, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
8.8
Haute