First published: Fri Apr 28 2017(Updated: )
Null pointer dereference vulnerability in NSS was found when server receives empty SSLv2 messages. This issue was introduced with the recent removal of SSLv2 protocol from upstream code in 3.24.0 and introduction of dedicated parser able to handle just sslv2-style hello messages. Upstream patch: <a href="https://hg.mozilla.org/projects/nss/rev/55ea60effd0d">https://hg.mozilla.org/projects/nss/rev/55ea60effd0d</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla NSS ESR | >3.24.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1446631 is classified as moderate due to the potential for a denial of service caused by a null pointer dereference.
To fix REDHAT-BUG-1446631, update Mozilla Network Security Services to a version higher than 3.24.0 that includes the upstream patch.
REDHAT-BUG-1446631 affects Mozilla Network Security Services version 3.24.0 and below.
REDHAT-BUG-1446631 is caused by a null pointer dereference when the server receives empty SSLv2 messages after recent code changes.
REDHAT-BUG-1446631 is categorized as a null pointer dereference vulnerability.