CVE-2016-1938

Summary

CVECVE-2016-1938
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2016-01-31 18:59:00 UTC
Updated2018-10-30 16:27:00 UTC
DescriptionThe s_mp_div function in lib/freebl/mpi/mpi.c in Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, improperly divides numbers, which might make it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging use of the (1) mp_div or (2) mp_exptmod function.

Risk And Classification

Problem Types: CWE-310

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Mozilla Firefox All All All All
Application Mozilla Nss All All All All
Operating System Opensuse Leap 42.1 All All All
Operating System Opensuse Leap 42.1 All All All
Operating System Opensuse Opensuse 13.1 All All All
Operating System Opensuse Opensuse 13.2 All All All
Operating System Opensuse Opensuse 13.1 All All All
Operating System Opensuse Opensuse 13.2 All All All

References

ReferenceSourceLinkTags
Errors in mp_div and mp_exptmod cryptographic functions in NSS — Mozilla CONFIRM www.mozilla.org Vendor Advisory
[security-announce] openSUSE-SU-2016:0306-1: important: Security update SUSE lists.opensuse.org Third Party Advisory
1190248 - (CVE-2016-1938) mp_div and mp_exptmod sometimes produce wrong calculation results CONFIRM bugzilla.mozilla.org Issue Tracking
Oracle Critical Patch Update - July 2016 CONFIRM www.oracle.com Third Party Advisory
bignum-fuzz/CVE-2016-1938-nss-mp_exptmod.c at master · hannob/bignum-fuzz · GitHub MISC github.com
USN-2880-2: Firefox regression | Ubuntu UBUNTU www.ubuntu.com
Oracle July 2016 Critical Patch Update Multiple Vulnerabilities BID www.securityfocus.com Third Party Advisory, VDB Entry
[security-announce] SUSE-SU-2016:0338-1: important: Security update for SUSE lists.opensuse.org
nss: diff lib/freebl/mpi/mpi.c CONFIRM hg.mozilla.org
Mozilla Products: Multiple vulnerabilities (GLSA 201605-06) — Gentoo security GENTOO security.gentoo.org
[security-announce] openSUSE-SU-2016:0309-1: important: Security update SUSE lists.opensuse.org Third Party Advisory
NSS 3.21 release notes - Mozilla | MDN MISC developer.mozilla.org Vendor Advisory
USN-2973-1: Thunderbird vulnerabilities | Ubuntu UBUNTU www.ubuntu.com
USN-2903-2: NSS regression | Ubuntu UBUNTU www.ubuntu.com
Debian -- Security Information -- DSA-3688-1 nss DEBIAN www.debian.org
USN-2903-1: NSS vulnerability | Ubuntu UBUNTU www.ubuntu.com
Mozilla Network Security Service (NSS): Multiple vulnerabilities (GLSA 201701-46) — Gentoo security GENTOO security.gentoo.org
Mozilla Network Security Services CVE-2016-1938 Weak Encryption Multiple Security Weaknesses BID www.securityfocus.com
Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Spoof the Address Bar, Bypass Security Restrictions, and Deny Service - SecurityTracker SECTRACK www.securitytracker.com
1194947 - miscalculation in mp_exptmod() CONFIRM bugzilla.mozilla.org Issue Tracking
USN-2880-1: Firefox vulnerabilities | Ubuntu UBUNTU www.ubuntu.com
bignum-fuzz/CVE-2016-1938-nss-mp_div.c at master · hannob/bignum-fuzz · GitHub MISC github.com
Mozilla NSS: Wrong calculation results in mp_div() and mp_exptmod() | The Fuzzing Project MISC blog.fuzzing-project.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 710518 Gentoo Linux Mozilla Network Security Service (NSS) Multiple Vulnerabilities (GLSA 201701-46)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report