Buffer Overflow Vulnerability in Network Security Services by Mozilla
CVE-2019-17006

9.8CRITICAL

Key Information:

Vendor
Mozilla
Status
Vendor
CVE Published:
22 October 2020

Summary

In Mozilla's Network Security Services (NSS) prior to version 3.46, a vulnerability exists due to missing length checks on several cryptographic primitives. Applications utilizing this library could potentially crash if they do not perform a proper sanity check on the input data, leading to a buffer overflow condition. This scenario may expose systems to security risks, including application crashes and potential data integrity issues.

Affected Version(s)

NSS < 3.46

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.