Bug 1315565 (CVE-2016-1978) - CVE-2016-1978 nss: Use-after-free in NSS during SSL connections in low memory (MFSA 2016-15)
Summary: CVE-2016-1978 nss: Use-after-free in NSS during SSL connections in low memory...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2016-1978
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1316003 1323648 1323649 1323650 1323651 1323652
Blocks: 1310521
TreeView+ depends on / blocked
 
Reported: 2016-03-08 05:44 UTC by Huzaifa S. Sidhpurwala
Modified: 2021-02-17 04:13 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
A use-after-free flaw was found in the way NSS handled DHE (Diffie–Hellman key exchange) and ECDHE (Elliptic Curve Diffie-Hellman key exchange) handshake messages. A remote attacker could send a specially crafted handshake message that, when parsed by an application linked against NSS, would cause that application to crash or, under certain special conditions, execute arbitrary code using the permissions of the user running the application.
Clone Of:
Environment:
Last Closed: 2019-06-08 02:49:30 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:0591 0 normal SHIPPED_LIVE Moderate: nss, nss-util, and nspr security, bug fix, and enhancement update 2016-04-05 15:19:29 UTC
Red Hat Product Errata RHSA-2016:0684 0 normal SHIPPED_LIVE Moderate: nss and nspr security, bug fix, and enhancement update 2016-04-25 16:14:15 UTC
Red Hat Product Errata RHSA-2016:0685 0 normal SHIPPED_LIVE Moderate: nss, nspr, nss-softokn, and nss-util security, bug fix, and enhancement update 2016-04-25 15:57:46 UTC

Description Huzaifa S. Sidhpurwala 2016-03-08 05:44:23 UTC
Mozilla developer Eric Rescorla reported that a failed allocation during DHE and ECDHE handshakes would lead to a use-after-free vulnerability. 

External Reference:

https://www.mozilla.org/security/announce/2016/mfsa2016-15.html

Comment 1 Huzaifa S. Sidhpurwala 2016-03-08 05:44:33 UTC
Acknowledgments:

Name: the Mozilla project
Upstream: Eric Rescorla

Comment 2 Huzaifa S. Sidhpurwala 2016-03-09 08:43:44 UTC
Created nss tracking bugs for this issue:

Affects: fedora-all [bug 1316003]

Comment 4 errata-xmlrpc 2016-04-05 11:20:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2016:0591 https://rhn.redhat.com/errata/RHSA-2016-0591.html

Comment 5 errata-xmlrpc 2016-04-25 11:58:30 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:0685 https://rhn.redhat.com/errata/RHSA-2016-0685.html

Comment 6 errata-xmlrpc 2016-04-25 12:15:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5

Via RHSA-2016:0684 https://rhn.redhat.com/errata/RHSA-2016-0684.html


Note You need to log in before you can comment on or make changes to this bug.