CentOS 7 : nss / nss-softokn / nss-util (CESA-2019:4190)

Medium Nessus Plugin ID 132400

Synopsis

The remote CentOS host is missing one or more security updates.

Description

An update for nss, nss-softokn, and nss-util is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.

The nss-softokn package provides the Network Security Services Softoken Cryptographic Module.

The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries.

Security Fix(es) :

* nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate (CVE-2019-11745)

* nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (CVE-2019-11729)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

Update the affected nss, nss-softokn and / or nss-util packages.

See Also

http://www.nessus.org/u?80d18268

http://www.nessus.org/u?eb556892

http://www.nessus.org/u?2c5de208

Plugin Details

Severity: Medium

ID: 132400

File Name: centos_RHSA-2019-4190.nasl

Version: 1.3

Type: local

Agent: unix

Published: 2019/12/27

Updated: 2020/01/15

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2019-11745

CVSS v2.0

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:centos:centos:nss, p-cpe:/a:centos:centos:nss-devel, p-cpe:/a:centos:centos:nss-pkcs11-devel, p-cpe:/a:centos:centos:nss-softokn, p-cpe:/a:centos:centos:nss-softokn-devel, p-cpe:/a:centos:centos:nss-softokn-freebl, p-cpe:/a:centos:centos:nss-softokn-freebl-devel, p-cpe:/a:centos:centos:nss-sysinit, p-cpe:/a:centos:centos:nss-tools, p-cpe:/a:centos:centos:nss-util, p-cpe:/a:centos:centos:nss-util-devel, cpe:/o:centos:centos:7

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 2019/12/24

Vulnerability Publication Date: 2019/07/23

Reference Information

CVE: CVE-2019-11729, CVE-2019-11745

RHSA: 2019:4190