Heap Overflow Vulnerability in NSS Affects Multiple Applications
CVE-2021-43527

9.8CRITICAL

Key Information:

Vendor
Mozilla
Status
Vendor
CVE Published:
8 December 2021

Summary

NSS versions earlier than 3.73 and 3.68.1 ESR are susceptible to a heap overflow vulnerability when processing DER-encoded DSA or RSA-PSS signatures. This could potentially affect applications utilizing NSS for signature verification in formats such as CMS, S/MIME, PKCS #7, or PKCS #12. Notably, email clients like Thunderbird and LibreOffice, along with PDF viewers such as Evince and Evolution, may be impacted. Applications employing NSS for certificate validation or TLS operations can also be vulnerable, contingent upon their specific configurations.

Affected Version(s)

NSS < 3.73

NSS < 3.68.1

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.