First published: Wed Dec 27 2017(Updated: )
Heap-based buffer overflow in the __hash_open function in lib/dbm/src/hash.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Network Security Services |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this heap-based buffer overflow is CVE-2017-11696.
The severity of CVE-2017-11696 is high with a CVSS score of 7.8.
Mozilla Network Security Services (NSS) is affected by CVE-2017-11696.
Context-dependent attackers can exploit CVE-2017-11696 by using a crafted cert8.db file.
To fix CVE-2017-11696, it is recommended to update Mozilla Network Security Services to a patched version.