First published: Fri Apr 28 2017(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/nss | 2:3.61-1+deb11u3 2:3.61-1+deb11u4 2:3.87.1-1+deb12u1 2:3.107-1 | |
Mozilla NSS ESR | =3.24.0 | |
Mozilla NSS ESR | =3.25.0 | |
Mozilla NSS ESR | =3.25.1 | |
Mozilla NSS ESR | =3.26.0 | |
Mozilla NSS ESR | =3.26.2 | |
Mozilla NSS ESR | =3.27.0 | |
Mozilla NSS ESR | =3.27.1 | |
Mozilla NSS ESR | =3.27.2 | |
Mozilla NSS ESR | =3.28.0 | |
Mozilla NSS ESR | =3.28.1 | |
Mozilla NSS ESR | =3.28.2 | |
Mozilla NSS ESR | =3.28.3 | |
Mozilla NSS ESR | =3.29.0 | |
Mozilla NSS ESR | =3.29.1 | |
Mozilla NSS ESR | =3.29.2 | |
Mozilla NSS ESR | =3.29.3 | |
Mozilla NSS ESR | =3.30.0 | |
Mozilla NSS ESR | =3.30.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7502 has been classified as a denial of service vulnerability.
To fix CVE-2017-7502, update to the latest patched version of the NSS software.
CVE-2017-7502 affects NSS versions starting from 3.24.0 up to 3.30.1.
CVE-2017-7502 can be exploited by an attacker sending empty SSLv2 messages to cause a denial of service.
There are no effective mitigations for CVE-2017-7502 other than upgrading to a secure version of NSS.