[Triumf-linux-managers] FYI: NSS heap buffer overflow vulnerability [CVE-2016-1950]

Andrew Daviel advax at triumf.ca
Fri Mar 11 16:14:39 PST 2016


FYI

EGI reports a 'critical' vulnerability in the NSS library

References
==========

[R 1] https://access.redhat.com/security/cve/CVE-2016-1950
[R 2] https://rhn.redhat.com/errata/RHSA-2016-0370.html
[R 3] https://security-tracker.debian.org/tracker/CVE-2016-1950
[R 4] http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1950.html


This should be automatically patched by yum update etc.
Firefox and Thunderbird are also linked with their own copy of NSS, so 
there should be an update for that, too, which should have been applied recently, or will 
be tonight.

                                Package
Red Hat Enterprise Linux 5      nss 
Red Hat Enterprise Linux 6      nss-util
Red Hat Enterprise Linux 7      nss-util




Quote:
"A heap-based buffer overflow flaw was found in the way NSS parsed 
certain ASN.1 structures. An attacker could use this flaw to create a 
specially crafted certificate which, when parsed by NSS, could cause it 
to crash, or execute arbitrary code, using the permissions of the user 
running an application compiled against the NSS library."

I believe it's only a threat to a server if it's set up to allow 
SSL certificates for authentication, which most aren't. But 
that's just my opinion.


-- 
Andrew Daviel, TRIUMF, Canada
Tel. +1 (604) 222-7376  (Pacific Time)
Network Security Manager


More information about the Triumf-linux-managers mailing list