Security researcher Kaspar Brand found a flaw in how the Network Security Services (NSS) ASN.1 decoder handles zero length items. Effects of this issue depend on the field. One known symptom is an unexploitable crash in handling OCSP responses. NSS also mishandles zero-length basic constraints, assuming default values for some types that should been rejected as malformed. Reference: http://www.mozilla.org/security/announce/2012/mfsa2012-39.html
From https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2012-0441 this was addressed on nss-3.13.4.
This issue does not affect the version of nss as shipped with Fedora 16 and 17, since its already updated to 3.13.4
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:1091 https://rhn.redhat.com/errata/RHSA-2012-1091.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2012:1090 https://rhn.redhat.com/errata/RHSA-2012-1090.html