First published: Wed Dec 27 2017(Updated: )
Heap-based buffer overflow in the alloc_segs function in lib/dbm/src/hash.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Network Security Services |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11695 is a vulnerability that allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.
CVE-2017-11695 has a severity score of 7.8 (High).
Mozilla Network Security Services is affected by CVE-2017-11695.
The heap-based buffer overflow in CVE-2017-11695 can be exploited by using a crafted cert8.db file.
Yes, you can find references for CVE-2017-11695 at the following links: [Link1](http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html), [Link2](http://seclists.org/fulldisclosure/2017/Aug/17), [Link3](http://www.geeknik.net/9brdqk6xu)