Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
History
21 Nov 2024, 02:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html - | |
References | () http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1980.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1981.html - | |
References | () http://www.debian.org/security/2015/dsa-3393 - | |
References | () http://www.debian.org/security/2015/dsa-3410 - | |
References | () http://www.debian.org/security/2016/dsa-3688 - | |
References | () http://www.mozilla.org/security/announce/2015/mfsa2015-133.html - Vendor Advisory | |
References | () http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html - Patch | |
References | () http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html - | |
References | () http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html - | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html - | |
References | () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - | |
References | () http://www.securityfocus.com/bid/77416 - | |
References | () http://www.securityfocus.com/bid/91787 - | |
References | () http://www.securitytracker.com/id/1034069 - | |
References | () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753 - | |
References | () http://www.ubuntu.com/usn/USN-2785-1 - | |
References | () http://www.ubuntu.com/usn/USN-2791-1 - | |
References | () http://www.ubuntu.com/usn/USN-2819-1 - | |
References | () https://bto.bluecoat.com/security-advisory/sa119 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1202868 - | |
References | () https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes - Vendor Advisory | |
References | () https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes - Vendor Advisory | |
References | () https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes - Vendor Advisory | |
References | () https://security.gentoo.org/glsa/201512-10 - | |
References | () https://security.gentoo.org/glsa/201605-06 - |
22 Oct 2024, 13:42
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mozilla:firefox_esr:38.1.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.0.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.2.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.3.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.1.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.2.1:*:*:*:*:*:*:* |
cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:* |
Information
Published : 2015-11-05 05:59
Updated : 2024-11-21 02:36
NVD link : CVE-2015-7182
Mitre link : CVE-2015-7182
CVE.ORG link : CVE-2015-7182
JSON object : View
Products Affected
mozilla
- firefox
- network_security_services
oracle
- opensso
- traffic_director
- glassfish_server
- iplanet_web_server
- iplanet_web_proxy_server
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer