CVE-2016-1938

The s_mp_div function in lib/freebl/mpi/mpi.c in Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, improperly divides numbers, which might make it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging use of the (1) mp_div or (2) mp_exptmod function.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
http://www.debian.org/security/2016/dsa-3688
http://www.mozilla.org/security/announce/2016/mfsa2016-07.html Vendor Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html Third Party Advisory
http://www.securityfocus.com/bid/81955
http://www.securityfocus.com/bid/91787 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1034825
http://www.ubuntu.com/usn/USN-2880-1
http://www.ubuntu.com/usn/USN-2880-2
http://www.ubuntu.com/usn/USN-2903-1
http://www.ubuntu.com/usn/USN-2903-2
http://www.ubuntu.com/usn/USN-2973-1
https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1190248 Issue Tracking
https://bugzilla.mozilla.org/show_bug.cgi?id=1194947 Issue Tracking
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes Vendor Advisory
https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c
https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c
https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
https://security.gentoo.org/glsa/201605-06
https://security.gentoo.org/glsa/201701-46
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
http://www.debian.org/security/2016/dsa-3688
http://www.mozilla.org/security/announce/2016/mfsa2016-07.html Vendor Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html Third Party Advisory
http://www.securityfocus.com/bid/81955
http://www.securityfocus.com/bid/91787 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1034825
http://www.ubuntu.com/usn/USN-2880-1
http://www.ubuntu.com/usn/USN-2880-2
http://www.ubuntu.com/usn/USN-2903-1
http://www.ubuntu.com/usn/USN-2903-2
http://www.ubuntu.com/usn/USN-2973-1
https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1190248 Issue Tracking
https://bugzilla.mozilla.org/show_bug.cgi?id=1194947 Issue Tracking
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes Vendor Advisory
https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c
https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c
https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
https://security.gentoo.org/glsa/201605-06
https://security.gentoo.org/glsa/201701-46
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:mozilla:nss:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:47

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html - () http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html -
References () http://www.debian.org/security/2016/dsa-3688 - () http://www.debian.org/security/2016/dsa-3688 -
References () http://www.mozilla.org/security/announce/2016/mfsa2016-07.html - Vendor Advisory () http://www.mozilla.org/security/announce/2016/mfsa2016-07.html - Vendor Advisory
References () http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html - Third Party Advisory () http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html - Third Party Advisory
References () http://www.securityfocus.com/bid/81955 - () http://www.securityfocus.com/bid/81955 -
References () http://www.securityfocus.com/bid/91787 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/91787 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1034825 - () http://www.securitytracker.com/id/1034825 -
References () http://www.ubuntu.com/usn/USN-2880-1 - () http://www.ubuntu.com/usn/USN-2880-1 -
References () http://www.ubuntu.com/usn/USN-2880-2 - () http://www.ubuntu.com/usn/USN-2880-2 -
References () http://www.ubuntu.com/usn/USN-2903-1 - () http://www.ubuntu.com/usn/USN-2903-1 -
References () http://www.ubuntu.com/usn/USN-2903-2 - () http://www.ubuntu.com/usn/USN-2903-2 -
References () http://www.ubuntu.com/usn/USN-2973-1 - () http://www.ubuntu.com/usn/USN-2973-1 -
References () https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html - () https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html -
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1190248 - Issue Tracking () https://bugzilla.mozilla.org/show_bug.cgi?id=1190248 - Issue Tracking
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1194947 - Issue Tracking () https://bugzilla.mozilla.org/show_bug.cgi?id=1194947 - Issue Tracking
References () https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes - Vendor Advisory () https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes - Vendor Advisory
References () https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c - () https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c -
References () https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c - () https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c -
References () https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c - () https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c -
References () https://security.gentoo.org/glsa/201605-06 - () https://security.gentoo.org/glsa/201605-06 -
References () https://security.gentoo.org/glsa/201701-46 - () https://security.gentoo.org/glsa/201701-46 -

Information

Published : 2016-01-31 18:59

Updated : 2024-11-21 02:47


NVD link : CVE-2016-1938

Mitre link : CVE-2016-1938

CVE.ORG link : CVE-2016-1938


JSON object : View

Products Affected

mozilla

  • nss
  • firefox

opensuse

  • opensuse
  • leap
CWE
CWE-310

Cryptographic Issues