vulnerability
SUSE: CVE-2016-1978: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Mar 11, 2016 | Mar 14, 2016 | Feb 8, 2021 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Mar 11, 2016
Added
Mar 14, 2016
Modified
Feb 8, 2021
Description
Use-after-free vulnerability in the ssl3_HandleECDHServerKeyExchange function in Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, allows remote attackers to cause a denial of service or possibly have unspecified other impact by making an SSL (1) DHE or (2) ECDHE handshake at a time of high memory consumption.
Solution(s)
suse-upgrade-libfreebl3suse-upgrade-libfreebl3-32bitsuse-upgrade-libfreebl3-hmacsuse-upgrade-libfreebl3-hmac-32bitsuse-upgrade-libfreebl3-x86suse-upgrade-libsoftokn3suse-upgrade-libsoftokn3-32bitsuse-upgrade-libsoftokn3-hmacsuse-upgrade-libsoftokn3-hmac-32bitsuse-upgrade-libsoftokn3-x86suse-upgrade-mozilla-nsprsuse-upgrade-mozilla-nspr-32bitsuse-upgrade-mozilla-nspr-develsuse-upgrade-mozilla-nspr-x86suse-upgrade-mozilla-nsssuse-upgrade-mozilla-nss-32bitsuse-upgrade-mozilla-nss-certssuse-upgrade-mozilla-nss-certs-32bitsuse-upgrade-mozilla-nss-develsuse-upgrade-mozilla-nss-sysinitsuse-upgrade-mozilla-nss-sysinit-32bitsuse-upgrade-mozilla-nss-toolssuse-upgrade-mozilla-nss-x86suse-upgrade-mozillafirefoxsuse-upgrade-mozillafirefox-develsuse-upgrade-mozillafirefox-translations
References
- SUSE-SUSE-SU-2016:0727
- SUSE-SUSE-SU-2016:0727-1
- SUSE-SUSE-SU-2016:0777
- SUSE-SUSE-SU-2016:0777-1
- SUSE-SUSE-SU-2016:0820
- SUSE-SUSE-SU-2016:0909
- SUSE-SUSE-SU-2016:0909-1
- REDHAT-RHSA-2016:0591
- REDHAT-RHSA-2016:0684
- REDHAT-RHSA-2016:0685
- DEBIAN-DLA-480-1
- DEBIAN-DSA-3688
- BID-84275
- BID-91787
- SECTRACK-1035258
- UBUNTU-USN-2973-1
- GENTOO-GLSA-201605-06
- NVD-CVE-2016-1978

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.