FreeBSD : NSS -- multiple vulnerabilities (c4292768-5273-4f17-a267-c5fe35125ce4)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Mozilla Foundation reports :

Security researcher Francis Gabriel reported a heap-based buffer
overflow in the way the Network Security Services (NSS) libraries
parsed certain ASN.1 structures. An attacker could create a
specially crafted certificate which, when parsed by NSS, would cause
it to crash or execute arbitrary code with the permissions of the
user.

Mozilla developer Tim Taubert used the Address Sanitizer tool and
software fuzzing to discover a use-after-free vulnerability while
processing DER encoded keys in the Network Security Services (NSS)
libraries. The vulnerability overwrites the freed memory with zeroes.

See also :

https://www.mozilla.org/security/advisories/mfsa2016-35/
https://www.mozilla.org/security/advisories/mfsa2016-36/
https://hg.mozilla.org/projects/nss/rev/b9a31471759d
https://hg.mozilla.org/projects/nss/rev/7033b1193c94
http://www.nessus.org/u?c4915696

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 89768 ()

Bugtraq ID:

CVE ID: CVE-2016-1950
CVE-2016-1979

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now