FreeBSD : nss -- Use-after-free in TLS 1.2 generating handshake hashes (e71fd9d3-af47-11e7-a633-009c02a2ab30)

high Nessus Plugin ID 103828

Language:

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Mozilla reports :

During TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. This saved data is used for later messages but in some cases, the handshake transcript can exceed the space available in the current buffer, causing the allocation of a new buffer. This leaves a pointer pointing to the old, freed buffer, resulting in a use-after-free when handshake hashes are then calculated afterwards.
This can result in a potentially exploitable crash.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?f536ef26

https://hg.mozilla.org/projects/nss/rev/2d7b65b72290

https://hg.mozilla.org/projects/nss/rev/d3865e2957d0

http://www.nessus.org/u?cf10e5bd

Plugin Details

Severity: High

ID: 103828

File Name: freebsd_pkg_e71fd9d3af4711e7a633009c02a2ab30.nasl

Version: 3.6

Type: local

Published: 10/13/2017

Updated: 1/4/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:linux-c6-nss, p-cpe:/a:freebsd:freebsd:linux-c7-nss, p-cpe:/a:freebsd:freebsd:nss, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 10/12/2017

Vulnerability Publication Date: 8/4/2017

Reference Information

CVE: CVE-2017-7805