First published: Sun Mar 13 2016(Updated: )
Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Mozilla NSS ESR | =3.19.2 | |
Mozilla NSS ESR | =3.20 | |
Mozilla NSS ESR | =3.20.1 | |
Mozilla NSS ESR | =3.21 | |
Any of | ||
Firefox | <=44.0.2 | |
Firefox | =38.0 | |
Firefox | =38.0.1 | |
Firefox | =38.0.5 | |
Firefox | =38.1.0 | |
Firefox | =38.1.1 | |
Firefox | =38.2.0 | |
Firefox | =38.2.1 | |
Firefox | =38.3.0 | |
Firefox | =38.4.0 | |
Firefox | =38.5.0 | |
Firefox | =38.5.1 | |
Firefox | =38.6.0 | |
Firefox | =38.6.1 | |
Oracle Linux | =5.0 | |
Oracle Linux | =6 | |
Oracle Linux | =7 | |
Oracle VM Server | =3.2 | |
iStyle @cosme iPhone OS | <=9.2.1 | |
Apple iOS and macOS | <=10.11.3 | |
tvOS | <=9.1 | |
Apple iOS, iPadOS, and watchOS | <=2.1 | |
GlassFish | =2.1.1 | |
Oracle iPlanet Web Proxy Server | =4.0 | |
Sun iPlanet Web Server | =7.0 | |
SUSE Linux | =13.1 | |
Mozilla NSS ESR | =3.19.2 | |
Mozilla NSS ESR | =3.20 | |
Mozilla NSS ESR | =3.20.1 | |
Mozilla NSS ESR | =3.21 | |
Firefox | <=44.0.2 | |
Firefox ESR | =38.0 | |
Firefox ESR | =38.0.1 | |
Firefox ESR | =38.0.5 | |
Firefox ESR | =38.1.0 | |
Firefox ESR | =38.1.1 | |
Firefox ESR | =38.2.0 | |
Firefox ESR | =38.2.1 | |
Firefox ESR | =38.3.0 | |
Firefox ESR | =38.4.0 | |
Firefox ESR | =38.5.0 | |
Firefox ESR | =38.5.1 | |
Firefox ESR | =38.6.0 | |
Firefox ESR | =38.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Yes, CVE-2016-1950 has known exploits that target crafted ASN.1 data in X.509 certificates.