Scientific Linux Security Update : nss and nss-util on SL5.x, SL6.x, SL7.x i386/x86_64

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote Scientific Linux host is missing one or more security
updates.

Description :

The nss-util packages provide utilities for use with the Network
Security Services (NSS) libraries.

The following packages have been upgraded to a newer upstream version:
nss (3.12.3), nss-util (3.12.3).

Security Fix(es) :

- Multiple buffer handling flaws were found in the way NSS
handled cryptographic data from the network. A remote
attacker could use these flaws to crash an application
using NSS or, possibly, execute arbitrary code with the
permission of the user running the application.
(CVE-2016-2834)

- A NULL pointer dereference flaw was found in the way NSS
handled invalid Diffie-Hellman keys. A remote client
could use this flaw to crash a TLS/SSL server using NSS.
(CVE-2016-5285)

- It was found that Diffie Hellman Client key exchange
handling in NSS was vulnerable to small subgroup
confinement attack. An attacker could use this flaw to
recover private keys by confining the client DH key to
small subgroup of the desired group. (CVE-2016-8635)

See also :

http://www.nessus.org/u?df4aa334

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 95052 ()

Bugtraq ID:

CVE ID: CVE-2016-2834
CVE-2016-5285
CVE-2016-8635

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now