Mozilla Network Security Services Memory Corruption And Heap Buffer Overflow Vulnerabilities
21 Feb. 2016
Summary
The sec_asn1d_parse_leaf function in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, improperly restricts access to an unspecified data structure, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data, related to a "use-after-poison" issue.
Credit:
The information has been provided by Tyson Smith and David Keeler.
Vulnerable Systems:
* Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1
Immune Systems:
* Mozilla Network Security Services (NSS) after 3.19.2.1 and 3.20.x after 3.20.1
Mozilla Network Security Services is prone to a memory-corruption and a heap-based buffer-overflow vulnerability. An attacker can exploit these issues to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions.