CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
95.1%
Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger certain improper removal of an NSSCertificate structure from a trust domain.
Vendor | Product | Version | CPE |
---|---|---|---|
mozilla | firefox | * | cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* |
mozilla | firefox_esr | 24.0 | cpe:2.3:a:mozilla:firefox_esr:24.0:*:*:*:*:*:*:* |
mozilla | firefox_esr | 24.0.1 | cpe:2.3:a:mozilla:firefox_esr:24.0.1:*:*:*:*:*:*:* |
mozilla | firefox_esr | 24.0.2 | cpe:2.3:a:mozilla:firefox_esr:24.0.2:*:*:*:*:*:*:* |
mozilla | firefox_esr | 24.1.0 | cpe:2.3:a:mozilla:firefox_esr:24.1.0:*:*:*:*:*:*:* |
mozilla | firefox_esr | 24.1.1 | cpe:2.3:a:mozilla:firefox_esr:24.1.1:*:*:*:*:*:*:* |
mozilla | firefox_esr | 24.2 | cpe:2.3:a:mozilla:firefox_esr:24.2:*:*:*:*:*:*:* |
mozilla | firefox_esr | 24.3 | cpe:2.3:a:mozilla:firefox_esr:24.3:*:*:*:*:*:*:* |
mozilla | firefox_esr | 24.4 | cpe:2.3:a:mozilla:firefox_esr:24.4:*:*:*:*:*:*:* |
mozilla | firefox_esr | 24.5 | cpe:2.3:a:mozilla:firefox_esr:24.5:*:*:*:*:*:*:* |
secunia.com/advisories/59591
secunia.com/advisories/59719
secunia.com/advisories/59760
secunia.com/advisories/60083
secunia.com/advisories/60486
secunia.com/advisories/60621
secunia.com/advisories/60628
www.debian.org/security/2014/dsa-2986
www.debian.org/security/2014/dsa-2996
www.mozilla.org/security/announce/2014/mfsa2014-63.html
www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
www.securityfocus.com/bid/68816
www.securitytracker.com/id/1030617
bugzilla.mozilla.org/show_bug.cgi?id=963150
security.gentoo.org/glsa/201504-01