First published: Fri Apr 07 2017(Updated: )
An out-of-bounds write during Base64 decoding operation in the Network Security Services (NSS) library due to insufficient memory being allocated to the buffer. This results in a potentially exploitable crash. External Reference: <a href="https://www.mozilla.org/en-US/security/advisories/mfsa2017-10/#CVE-2017-5461">https://www.mozilla.org/en-US/security/advisories/mfsa2017-10/#CVE-2017-5461</a> Acknowledgements: Name: the Mozilla project Upstream: Ronald Crane
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla NSS ESR |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1440080 is considered high due to the potential for exploitation leading to crashes.
To fix REDHAT-BUG-1440080, update to the latest version of Mozilla Network Security Services (NSS) that addresses this vulnerability.
REDHAT-BUG-1440080 involves an out-of-bounds write vulnerability during Base64 decoding operations.
The impact of REDHAT-BUG-1440080 can include application crashes and potential exploitation of the affected NSS library.
If you are using a version of the Mozilla Network Security Services library that is prior to the fixed releases, your software may be affected by REDHAT-BUG-1440080.