Buffer Overflow Vulnerability in Network Security Services by Mozilla
CVE-2019-17006
9.8CRITICAL
Summary
In Mozilla's Network Security Services (NSS) prior to version 3.46, a vulnerability exists due to missing length checks on several cryptographic primitives. Applications utilizing this library could potentially crash if they do not perform a proper sanity check on the input data, leading to a buffer overflow condition. This scenario may expose systems to security risks, including application crashes and potential data integrity issues.
Affected Version(s)
NSS < 3.46
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved