First published: Wed Apr 19 2017(Updated: )
A flaw in DRBG number generation within the Network Security Services (NSS) library where the internal state V does not correctly carry bits over. The NSS library has been updated to fix this issue to address this issue and Firefox 53 has been updated with NSS version 3.29.5.
Credit: security@mozilla.org security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <52.1 | 52.1 |
Mozilla Firefox ESR | <52.1 | 52.1 |
Mozilla Firefox ESR | <45.9 | 45.9 |
Mozilla Firefox | <53 | 53 |
Debian GNU/Linux | =8.0 | |
Mozilla Firefox | <53.0 | |
Mozilla Firefox | =52.0 | |
Mozilla Firefox ESR | <45.9.0 | |
Mozilla NSS ESR | <3.28.4 | |
Mozilla Thunderbird | <52.1.0 | |
Mozilla Firefox ESR | =52.0 | |
debian/firefox | 135.0-1 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.7.0esr-1~deb11u1 128.5.0esr-1~deb12u1 128.7.0esr-1~deb12u1 128.7.0esr-1 | |
debian/nss | 2:3.61-1+deb11u3 2:3.61-1+deb11u4 2:3.87.1-1+deb12u1 2:3.107-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2017-5462 has been classified as medium severity due to its impact on the pseudorandom number generation.
To fix CVE-2017-5462, upgrade to Firefox version 53 or later, Thunderbird version 52.2 or later, or Firefox ESR version 52.1 or later.
CVE-2017-5462 affects Mozilla Firefox versions up to 53, Firefox ESR versions up to 52.1, and Thunderbird versions up to 52.1.
The impact of CVE-2017-5462 could allow an attacker to predict or influence the outcome of cryptographic operations using the flawed pseudorandom number generator.
CVE-2017-5462 specifically affects Mozilla's products such as Firefox and Thunderbird and does not directly impact third-party software.