First published: Mon Dec 15 2014(Updated: )
Mozilla Network Security Services (NSS) could allow a remote attacker to bypass security restrictions, caused by the failure to ensure that the DER encoding of an ASN.1 length is properly formed by the definite_length_decoder function. An attacker could exploit this vulnerability using a long byte sequence for an encoding to bypass restrictions and conduct data-smuggling attacks.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 | |
Mozilla NSS ESR | <=3.16.2.3 | |
Mozilla NSS ESR | =3.16.2.0 | |
Mozilla NSS ESR | =3.16.2.1 | |
Mozilla NSS ESR | =3.16.2.2 | |
Mozilla NSS ESR | =3.17.0 | |
Mozilla NSS ESR | =3.17.1 | |
Mozilla NSS ESR | =3.17.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1569 is considered a medium severity vulnerability due to its ability to allow remote attackers to bypass security restrictions.
To fix CVE-2014-1569, you should apply the latest patches provided for affected software versions.
CVE-2014-1569 affects Mozilla Network Security Services and specific versions of IBM Cognos Analytics.
Yes, CVE-2014-1569 can be exploited remotely by attackers using crafted input.
Yes, NSS versions up to 3.17.2 are affected by CVE-2014-1569.