logo
DATABASE RESOURCES PRICING ABOUT US

CVE-2021-43527

Description

NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. *Note: This vulnerability does NOT impact Mozilla Firefox.* However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS < 3.73 and NSS < 3.68.1.


Affected Software


CPE Name Name Version
mozilla:nss_esr mozilla nss esr 3.68.1
mozilla:nss mozilla nss 3.73
netapp:cloud_backup netapp cloud backup -
netapp:e-series_santricity_os_controller netapp e-series santricity os controller 11.70.1
oracle:communications_cloud_native_core_network_slice_selection_function oracle communications cloud native core network slice selection function 1.8.0
oracle:communications_cloud_native_core_network_repository_function oracle communications cloud native core network repository function 1.15.0
oracle:communications_cloud_native_core_network_repository_function oracle communications cloud native core network repository function 1.15.1
oracle:communications_cloud_native_core_binding_support_function oracle communications cloud native core binding support function 1.11.0
oracle:communications_policy_management oracle communications policy management 12.6.0.0.0
starwindsoftware:starwind_virtual_san starwindsoftware starwind virtual san v8r13
starwindsoftware:starwind_san_\&_nas starwindsoftware starwind san \& nas v8r13

Related