CVE-2015-7182

critical

Description

Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.

References

https://security.gentoo.org/glsa/201605-06

https://security.gentoo.org/glsa/201512-10

https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes

https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes

https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes

https://bugzilla.mozilla.org/show_bug.cgi?id=1202868

https://bto.bluecoat.com/security-advisory/sa119

http://www.ubuntu.com/usn/USN-2819-1

http://www.ubuntu.com/usn/USN-2791-1

http://www.ubuntu.com/usn/USN-2785-1

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753

http://www.securitytracker.com/id/1034069

http://www.securityfocus.com/bid/91787

http://www.securityfocus.com/bid/77416

http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html

http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html

http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html

http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html

http://www.mozilla.org/security/announce/2015/mfsa2015-133.html

http://www.debian.org/security/2016/dsa-3688

http://www.debian.org/security/2015/dsa-3410

http://www.debian.org/security/2015/dsa-3393

http://rhn.redhat.com/errata/RHSA-2015-1981.html

http://rhn.redhat.com/errata/RHSA-2015-1980.html

http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html

http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html

http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html

http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html

http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html

http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html

http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html

http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html

Details

Source: Mitre, NVD

Published: 2015-11-05

Updated: 2024-10-22

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical