First published: Mon Jul 31 2017(Updated: )
It was discovered that NSS incorrectly handled certain empty SSLv2 messages. A remote attacker could possibly use this issue to cause NSS to crash, resulting in a denial of service. (CVE-2017-7502) Karthik Bhargavan and Gaetan Leurent discovered that the DES and Triple DES ciphers were vulnerable to birthday attacks. A remote attacker could possibly use this flaw to obtain clear text data from long encrypted sessions. This update causes NSS to limit use of the same symmetric key. (CVE-2016-2183) It was discovered that NSS incorrectly handled Base64 decoding. A remote attacker could use this flaw to cause NSS to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2017-5461)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libnss3 | <2:3.28.4-0ubuntu0.12.04.1 | 2:3.28.4-0ubuntu0.12.04.1 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-3372-1 is classified as a denial of service vulnerability that could crash the NSS library.
To fix USN-3372-1, upgrade the libnss3 package to version 2:3.28.4-0ubuntu0.12.04.1 or later.
Ubuntu 12.04 is affected by USN-3372-1.
The vulnerability in USN-3372-1 is caused by NSS incorrectly handling empty SSLv2 messages.
Yes, a remote attacker could exploit USN-3372-1 to crash the NSS library, leading to denial of service.