First published: Wed Jun 21 2017(Updated: )
It was discovered that NSS incorrectly handled certain empty SSLv2 messages. A remote attacker could possibly use this issue to cause NSS to crash, resulting in a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libnss3 | <2:3.28.4-0ubuntu0.17.04.2 | 2:3.28.4-0ubuntu0.17.04.2 |
Ubuntu gir1.2-packagekitglib-1.0 | =17.04 | |
All of | ||
ubuntu/libnss3 | <2:3.28.4-0ubuntu0.16.10.2 | 2:3.28.4-0ubuntu0.16.10.2 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.10 | |
All of | ||
ubuntu/libnss3 | <2:3.28.4-0ubuntu0.16.04.2 | 2:3.28.4-0ubuntu0.16.04.2 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 | |
All of | ||
ubuntu/libnss3 | <2:3.28.4-0ubuntu0.14.04.2 | 2:3.28.4-0ubuntu0.14.04.2 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-3336-1 is classified as a denial of service vulnerability.
To resolve USN-3336-1, upgrade libnss3 to the patched version appropriate for your Ubuntu release.
USN-3336-1 affects Ubuntu versions 14.04, 16.04, 16.10, and 17.04.
USN-3336-1 addresses a vulnerability where NSS incorrectly handled certain empty SSLv2 messages.
Yes, a successful exploit of USN-3336-1 can potentially lead to remote system crashes.