CVE-2017-5461

Mozilla Network Security Services (NSS) before 3.21.4, 3.22.x through 3.28.x before 3.28.4, 3.29.x before 3.29.5, and 3.30.x before 3.30.1 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by leveraging incorrect base64 operations.
References
Link Resource
http://www.debian.org/security/2017/dsa-3831 Patch
http://www.debian.org/security/2017/dsa-3872 Patch
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html Patch
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html Patch
http://www.securityfocus.com/bid/98050 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1038320 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:1100 Patch
https://access.redhat.com/errata/RHSA-2017:1101 Patch
https://access.redhat.com/errata/RHSA-2017:1102 Patch
https://access.redhat.com/errata/RHSA-2017:1103 Patch
https://bugzilla.mozilla.org/show_bug.cgi?id=1344380 Issue Tracking Permissions Required
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.4_release_notes Release Notes Vendor Advisory
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.28.4_release_notes Release Notes Vendor Advisory
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.29.5_release_notes Release Notes Vendor Advisory
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.30.1_release_notes Release Notes Vendor Advisory
https://security.gentoo.org/glsa/201705-04 Third Party Advisory
https://www.mozilla.org/en-US/security/advisories/mfsa2017-10/#CVE-2017-5461 Vendor Advisory
https://www.mozilla.org/en-US/security/advisories/mfsa2017-11/#CVE-2017-5461 Vendor Advisory
https://www.mozilla.org/en-US/security/advisories/mfsa2017-12/#CVE-2017-5461 Vendor Advisory
https://www.mozilla.org/en-US/security/advisories/mfsa2017-13/#CVE-2017-5461 Vendor Advisory
https://www.oracle.com//security-alerts/cpujul2021.html
http://www.debian.org/security/2017/dsa-3831 Patch
http://www.debian.org/security/2017/dsa-3872 Patch
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html Patch
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html Patch
http://www.securityfocus.com/bid/98050 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1038320 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:1100 Patch
https://access.redhat.com/errata/RHSA-2017:1101 Patch
https://access.redhat.com/errata/RHSA-2017:1102 Patch
https://access.redhat.com/errata/RHSA-2017:1103 Patch
https://bugzilla.mozilla.org/show_bug.cgi?id=1344380 Issue Tracking Permissions Required
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.4_release_notes Release Notes Vendor Advisory
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.28.4_release_notes Release Notes Vendor Advisory
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.29.5_release_notes Release Notes Vendor Advisory
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.30.1_release_notes Release Notes Vendor Advisory
https://security.gentoo.org/glsa/201705-04 Third Party Advisory
https://www.mozilla.org/en-US/security/advisories/mfsa2017-10/#CVE-2017-5461 Vendor Advisory
https://www.mozilla.org/en-US/security/advisories/mfsa2017-11/#CVE-2017-5461 Vendor Advisory
https://www.mozilla.org/en-US/security/advisories/mfsa2017-12/#CVE-2017-5461 Vendor Advisory
https://www.mozilla.org/en-US/security/advisories/mfsa2017-13/#CVE-2017-5461 Vendor Advisory
https://www.oracle.com//security-alerts/cpujul2021.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:27

Type Values Removed Values Added
References () http://www.debian.org/security/2017/dsa-3831 - Patch () http://www.debian.org/security/2017/dsa-3831 - Patch
References () http://www.debian.org/security/2017/dsa-3872 - Patch () http://www.debian.org/security/2017/dsa-3872 - Patch
References () http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html - Patch () http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html - Patch
References () http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html - Patch () http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html - Patch
References () http://www.securityfocus.com/bid/98050 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/98050 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1038320 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1038320 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2017:1100 - Patch () https://access.redhat.com/errata/RHSA-2017:1100 - Patch
References () https://access.redhat.com/errata/RHSA-2017:1101 - Patch () https://access.redhat.com/errata/RHSA-2017:1101 - Patch
References () https://access.redhat.com/errata/RHSA-2017:1102 - Patch () https://access.redhat.com/errata/RHSA-2017:1102 - Patch
References () https://access.redhat.com/errata/RHSA-2017:1103 - Patch () https://access.redhat.com/errata/RHSA-2017:1103 - Patch
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1344380 - Issue Tracking, Permissions Required () https://bugzilla.mozilla.org/show_bug.cgi?id=1344380 - Issue Tracking, Permissions Required
References () https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.4_release_notes - Release Notes, Vendor Advisory () https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.4_release_notes - Release Notes, Vendor Advisory
References () https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.28.4_release_notes - Release Notes, Vendor Advisory () https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.28.4_release_notes - Release Notes, Vendor Advisory
References () https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.29.5_release_notes - Release Notes, Vendor Advisory () https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.29.5_release_notes - Release Notes, Vendor Advisory
References () https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.30.1_release_notes - Release Notes, Vendor Advisory () https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.30.1_release_notes - Release Notes, Vendor Advisory
References () https://security.gentoo.org/glsa/201705-04 - Third Party Advisory () https://security.gentoo.org/glsa/201705-04 - Third Party Advisory
References () https://www.mozilla.org/en-US/security/advisories/mfsa2017-10/#CVE-2017-5461 - Vendor Advisory () https://www.mozilla.org/en-US/security/advisories/mfsa2017-10/#CVE-2017-5461 - Vendor Advisory
References () https://www.mozilla.org/en-US/security/advisories/mfsa2017-11/#CVE-2017-5461 - Vendor Advisory () https://www.mozilla.org/en-US/security/advisories/mfsa2017-11/#CVE-2017-5461 - Vendor Advisory
References () https://www.mozilla.org/en-US/security/advisories/mfsa2017-12/#CVE-2017-5461 - Vendor Advisory () https://www.mozilla.org/en-US/security/advisories/mfsa2017-12/#CVE-2017-5461 - Vendor Advisory
References () https://www.mozilla.org/en-US/security/advisories/mfsa2017-13/#CVE-2017-5461 - Vendor Advisory () https://www.mozilla.org/en-US/security/advisories/mfsa2017-13/#CVE-2017-5461 - Vendor Advisory
References () https://www.oracle.com//security-alerts/cpujul2021.html - () https://www.oracle.com//security-alerts/cpujul2021.html -

Information

Published : 2017-05-11 01:29

Updated : 2024-11-21 03:27


NVD link : CVE-2017-5461

Mitre link : CVE-2017-5461

CVE.ORG link : CVE-2017-5461


JSON object : View

Products Affected

mozilla

  • network_security_services
CWE
CWE-787

Out-of-bounds Write