CVE-2019-17006

Published on: 10/22/2020 12:00:00 AM UTC

Last Modified on: 07/21/2021 11:39:00 AM UTC

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Network Security Services from Mozilla contain the following vulnerability:

In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.

  • CVE-2019-17006 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as CRITICAL severity.
  • Affected Vendor/Software: URL Logo Mozilla - NSS version < 3.46

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 10 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
Siemens RUGGEDCOM ROX II | CISA Third Party Advisory
US Government Resource
us-cert.cisa.gov
text/html
URL Logo MISC us-cert.cisa.gov/ics/advisories/icsa-21-040-04
NSS 3.46 release notes - Mozilla | MDN Release Notes
Vendor Advisory
developer.mozilla.org
text/html
URL Logo MISC developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes
Third Party Advisory
cert-portal.siemens.com
application/pdf
URL Logo CONFIRM cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
CVE-2019-17006 Libnss Vulnerability in NetApp Products | NetApp Product Security Third Party Advisory
security.netapp.com
text/html
URL Logo CONFIRM security.netapp.com/advisory/ntap-20210129-0001/
Access Denied Exploit
Issue Tracking
Patch
Vendor Advisory
bugzilla.mozilla.org
text/html
URL Logo MISC bugzilla.mozilla.org/show_bug.cgi?id=1539788

Related QID Numbers

  • 239173 Red Hat Update for nss and nss-softokn (RHSA-2021:0876)
  • 239184 Red Hat Update for nss-softokn (RHSA-2021:1026)
  • 352469 Amazon Linux Security Advisory for nspr, nss-softokn, nss-util: ALAS-2021-1522
  • 377524 Alibaba Cloud Linux Security Update for nss and nspr (ALINUX2-SA-2020:0173)
  • 904892 Common Base Linux Mariner (CBL-Mariner) Security Update for openjdk8 (12400)
  • 904917 Common Base Linux Mariner (CBL-Mariner) Security Update for mozjs60 (12367)
  • 940400 AlmaLinux Security Update for nss and nspr (ALSA-2020:3280)
  • 960710 Rocky Linux Security Update for nss and nspr (RLSA-2020:3280)

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationMozillaNetwork Security ServicesAllAllAllAll
ApplicationMozillaNetwork Security ServicesAllAllAllAll
Hardware Device InfoNetappHci Compute Node-AllAllAll
Hardware Device InfoNetappHci Compute Node-AllAllAll
ApplicationNetappHci Management Node-AllAllAll
ApplicationNetappHci Management Node-AllAllAll
Hardware Device InfoNetappHci Storage Node-AllAllAll
Hardware Device InfoNetappHci Storage Node-AllAllAll
ApplicationNetappSolidfire-AllAllAll
ApplicationNetappSolidfire-AllAllAll
Hardware Device InfoSiemensRuggedcom Rox Mx5000-AllAllAll
Hardware Device InfoSiemensRuggedcom Rox Mx5000-AllAllAll
Operating
System
SiemensRuggedcom Rox Mx5000 FirmwareAllAllAllAll
Operating
System
SiemensRuggedcom Rox Mx5000 FirmwareAllAllAllAll
Hardware Device InfoSiemensRuggedcom Rox Rx1400-AllAllAll
Hardware Device InfoSiemensRuggedcom Rox Rx1400-AllAllAll
Operating
System
SiemensRuggedcom Rox Rx1400 FirmwareAllAllAllAll
Operating
System
SiemensRuggedcom Rox Rx1400 FirmwareAllAllAllAll
Hardware Device InfoSiemensRuggedcom Rox Rx1500-AllAllAll
Hardware Device InfoSiemensRuggedcom Rox Rx1500-AllAllAll
Operating
System
SiemensRuggedcom Rox Rx1500 FirmwareAllAllAllAll
Operating
System
SiemensRuggedcom Rox Rx1500 FirmwareAllAllAllAll
Hardware Device InfoSiemensRuggedcom Rox Rx1501-AllAllAll
Hardware Device InfoSiemensRuggedcom Rox Rx1501-AllAllAll
Operating
System
SiemensRuggedcom Rox Rx1501 FirmwareAllAllAllAll
Operating
System
SiemensRuggedcom Rox Rx1501 FirmwareAllAllAllAll
Hardware Device InfoSiemensRuggedcom Rox Rx1510-AllAllAll
Hardware Device InfoSiemensRuggedcom Rox Rx1510-AllAllAll
Operating
System
SiemensRuggedcom Rox Rx1510 FirmwareAllAllAllAll
Operating
System
SiemensRuggedcom Rox Rx1510 FirmwareAllAllAllAll
Hardware Device InfoSiemensRuggedcom Rox Rx1511-AllAllAll
Hardware Device InfoSiemensRuggedcom Rox Rx1511-AllAllAll
Operating
System
SiemensRuggedcom Rox Rx1511 FirmwareAllAllAllAll
Operating
System
SiemensRuggedcom Rox Rx1511 FirmwareAllAllAllAll
Hardware Device InfoSiemensRuggedcom Rox Rx1512-AllAllAll
Hardware Device InfoSiemensRuggedcom Rox Rx1512-AllAllAll
Operating
System
SiemensRuggedcom Rox Rx1512 FirmwareAllAllAllAll
Operating
System
SiemensRuggedcom Rox Rx1512 FirmwareAllAllAllAll
Hardware Device InfoSiemensRuggedcom Rox Rx5000-AllAllAll
Hardware Device InfoSiemensRuggedcom Rox Rx5000-AllAllAll
Operating
System
SiemensRuggedcom Rox Rx5000 FirmwareAllAllAllAll
Operating
System
SiemensRuggedcom Rox Rx5000 FirmwareAllAllAllAll
  • cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*:
  • cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*:
  • cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*:
  • cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*:
  • cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_mx5000:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_mx5000:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_mx5000_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_mx5000_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_rx1400:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_rx1400:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_rx1400_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_rx1400_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_rx1500:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_rx1500:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_rx1500_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_rx1500_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_rx1501:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_rx1501:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_rx1501_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_rx1501_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_rx1510:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_rx1510:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_rx1510_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_rx1510_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_rx1511:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_rx1511:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_rx1511_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_rx1511_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_rx1512:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_rx1512:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_rx1512_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_rx1512_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_rx5000:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:siemens:ruggedcom_rox_rx5000:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_rx5000_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:siemens:ruggedcom_rox_rx5000_firmware:*:*:*:*:*:*:*:*:

Social Mentions

Source Title Posted (UTC)
© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report