First published: Wed Dec 27 2017(Updated: )
Mozilla Network Security Services (NSS), as used in Mozilla Firefox could allow a local attacker to gain elevated privileges on the system, caused by a floating point exception in __hash_open() in 'hash.c'. By using the NSS tool certutil and malformed cert8.db file, a local attacker could exploit this vulnerability to execute arbitrary code on the system with elevated privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Network Security Services | ||
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11697 is a vulnerability in Mozilla Network Security Services (NSS) that allows context-dependent attackers to cause a denial of service (floating point exception and crash) via a crafted cert8.db file.
The __hash_open function in NSS can be exploited by using a crafted cert8.db file to cause a denial of service by triggering a floating point exception and crashing the system.
CVE-2017-11697 has a severity rating of 7.8 (high).
The Common Weakness Enumeration (CWE) ID for CVE-2017-11697 is CWE-119.
Yes, you can find more information about CVE-2017-11697 at the following references: [1](http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html), [2](http://seclists.org/fulldisclosure/2017/Aug/17), [3](http://www.geeknik.net/9brdqk6xu).