CVE-2013-1739

Mozilla Network Security Services (NSS) before 3.15.2 does not ensure that data structures are initialized before read operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a decryption failure.
References
Link Resource
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html
http://lists.opensuse.org/opensuse-updates/2013-10/msg00013.html
http://lists.opensuse.org/opensuse-updates/2013-10/msg00016.html
http://rhn.redhat.com/errata/RHSA-2013-1791.html
http://rhn.redhat.com/errata/RHSA-2013-1829.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://security.gentoo.org/glsa/glsa-201406-19.xml
http://www.debian.org/security/2013/dsa-2790
http://www.mozilla.org/security/announce/2013/mfsa2013-93.html
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/62966
http://www.ubuntu.com/usn/USN-2030-1
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://bugzilla.mozilla.org/show_bug.cgi?id=894370
https://bugzilla.redhat.com/show_bug.cgi?id=1012656
https://developer.mozilla.org/en-US/docs/NSS/NSS_3.15.2_release_notes Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19254
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html
http://lists.opensuse.org/opensuse-updates/2013-10/msg00013.html
http://lists.opensuse.org/opensuse-updates/2013-10/msg00016.html
http://rhn.redhat.com/errata/RHSA-2013-1791.html
http://rhn.redhat.com/errata/RHSA-2013-1829.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://security.gentoo.org/glsa/glsa-201406-19.xml
http://www.debian.org/security/2013/dsa-2790
http://www.mozilla.org/security/announce/2013/mfsa2013-93.html
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/62966
http://www.ubuntu.com/usn/USN-2030-1
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://bugzilla.mozilla.org/show_bug.cgi?id=894370
https://bugzilla.redhat.com/show_bug.cgi?id=1012656
https://developer.mozilla.org/en-US/docs/NSS/NSS_3.15.2_release_notes Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19254
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.3.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.3.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.10:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.12.11:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.14:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.14.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.14.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.14.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.15:*:*:*:*:*:*:*

History

21 Nov 2024, 01:50

Type Values Removed Values Added
References () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761 - () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761 -
References () http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html - () http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html -
References () http://lists.opensuse.org/opensuse-updates/2013-10/msg00013.html - () http://lists.opensuse.org/opensuse-updates/2013-10/msg00013.html -
References () http://lists.opensuse.org/opensuse-updates/2013-10/msg00016.html - () http://lists.opensuse.org/opensuse-updates/2013-10/msg00016.html -
References () http://rhn.redhat.com/errata/RHSA-2013-1791.html - () http://rhn.redhat.com/errata/RHSA-2013-1791.html -
References () http://rhn.redhat.com/errata/RHSA-2013-1829.html - () http://rhn.redhat.com/errata/RHSA-2013-1829.html -
References () http://seclists.org/fulldisclosure/2014/Dec/23 - () http://seclists.org/fulldisclosure/2014/Dec/23 -
References () http://security.gentoo.org/glsa/glsa-201406-19.xml - () http://security.gentoo.org/glsa/glsa-201406-19.xml -
References () http://www.debian.org/security/2013/dsa-2790 - () http://www.debian.org/security/2013/dsa-2790 -
References () http://www.mozilla.org/security/announce/2013/mfsa2013-93.html - () http://www.mozilla.org/security/announce/2013/mfsa2013-93.html -
References () http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html - () http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html -
References () http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html - () http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html -
References () http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html - () http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html -
References () http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html - () http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html -
References () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -
References () http://www.securityfocus.com/archive/1/534161/100/0/threaded - () http://www.securityfocus.com/archive/1/534161/100/0/threaded -
References () http://www.securityfocus.com/bid/62966 - () http://www.securityfocus.com/bid/62966 -
References () http://www.ubuntu.com/usn/USN-2030-1 - () http://www.ubuntu.com/usn/USN-2030-1 -
References () http://www.vmware.com/security/advisories/VMSA-2014-0012.html - () http://www.vmware.com/security/advisories/VMSA-2014-0012.html -
References () https://bugzilla.mozilla.org/show_bug.cgi?id=894370 - () https://bugzilla.mozilla.org/show_bug.cgi?id=894370 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1012656 - () https://bugzilla.redhat.com/show_bug.cgi?id=1012656 -
References () https://developer.mozilla.org/en-US/docs/NSS/NSS_3.15.2_release_notes - Vendor Advisory () https://developer.mozilla.org/en-US/docs/NSS/NSS_3.15.2_release_notes - Vendor Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19254 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19254 -

Information

Published : 2013-10-22 22:55

Updated : 2024-11-21 01:50


NVD link : CVE-2013-1739

Mitre link : CVE-2013-1739

CVE.ORG link : CVE-2013-1739


JSON object : View

Products Affected

mozilla

  • network_security_services