First published: Mon Jun 13 2016(Updated: )
Mozilla Network Security Services (NSS) before 3.23, as used in Mozilla Firefox before 47.0, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 | |
Ubuntu | =16.04 | |
openSUSE | =42.1 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
Mozilla NSS ESR | <=3.22 | |
Mozilla Firefox | <=46.0.1 | |
SUSE Linux Enterprise Software Development Kit | =12.0 | |
SUSE Linux Enterprise Software Development Kit | =12.0-sp1 | |
SUSE Linux Enterprise Desktop | =12.0 | |
SUSE Linux Enterprise Desktop | =12.0-sp1 | |
SUSE Linux Enterprise Server | =12.0 | |
SUSE Linux Enterprise Server | =12.0-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2834 has a medium severity level due to its potential to cause denial of service and application crashes.
To address CVE-2016-2834, users should upgrade to Mozilla Network Security Services version 3.23 or later and update their Firefox browser to version 47.0 or later.
CVE-2016-2834 affects various versions of Mozilla Firefox prior to 47.0 and Mozilla NSS versions before 3.23, as well as specific Ubuntu and openSUSE distributions.
CVE-2016-2834 is primarily known for causing denial of service, and there is no direct indication that it leads to data exposure.
CVE-2016-2834 can be exploited through remote attacks that target memory corruption vulnerabilities, leading to application crashes.