CVE-2015-7181

critical

Description

The sec_asn1d_parse_leaf function in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, improperly restricts access to an unspecified data structure, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data, related to a "use-after-poison" issue.

References

https://security.gentoo.org/glsa/201605-06

https://security.gentoo.org/glsa/201512-10

https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes

https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes

https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes

https://bugzilla.mozilla.org/show_bug.cgi?id=1192028

https://bto.bluecoat.com/security-advisory/sa119

http://www.ubuntu.com/usn/USN-2819-1

http://www.ubuntu.com/usn/USN-2791-1

http://www.ubuntu.com/usn/USN-2785-1

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753

http://www.securitytracker.com/id/1034069

http://www.securityfocus.com/bid/91787

http://www.securityfocus.com/bid/77416

http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html

http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html

http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html

http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html

http://www.mozilla.org/security/announce/2015/mfsa2015-133.html

http://www.debian.org/security/2016/dsa-3688

http://www.debian.org/security/2015/dsa-3410

http://www.debian.org/security/2015/dsa-3393

http://rhn.redhat.com/errata/RHSA-2015-1981.html

http://rhn.redhat.com/errata/RHSA-2015-1980.html

http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html

http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html

http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html

http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html

http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html

http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html

http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html

http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html

Details

Source: Mitre, NVD

Published: 2015-11-05

Updated: 2024-10-22

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical