Lucene search

K
mozillaMozilla FoundationMFSA2013-65
HistoryAug 06, 2013 - 12:00 a.m.

Buffer underflow when generating CRMF requests — Mozilla

2013-08-0600:00:00
Mozilla Foundation
www.mozilla.org
15

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.06 Low

EPSS

Percentile

93.5%

Security researcher Nils used the Address Sanitizer to discover a use-after-free problem when generating a Certificate Request Message Format (CRMF) request with certain parameters. This causes a potentially exploitable crash.

Affected configurations

Vulners
Node
mozillafirefoxRange<17.0.9
OR
mozillafirefoxRange<23
OR
mozillaseamonkeyRange<2.20
CPENameOperatorVersion
firefoxlt17.0.9
firefoxlt23
seamonkeylt2.20

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.06 Low

EPSS

Percentile

93.5%