Rapid7 Vulnerability & Exploit Database

Amazon Linux AMI: Security patch for nss (ALAS-2014-385) (CVE-2014-1544)

Back to Search

Amazon Linux AMI: Security patch for nss (ALAS-2014-385) (CVE-2014-1544)

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
07/23/2014
Created
07/25/2018
Added
09/26/2014
Modified
07/04/2017

Description

Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger certain improper removal of an NSSCertificate structure from a trust domain.

Solution(s)

  • amazon-linux-upgrade-nss
  • amazon-linux-upgrade-nss-debuginfo
  • amazon-linux-upgrade-nss-devel
  • amazon-linux-upgrade-nss-pkcs11-devel
  • amazon-linux-upgrade-nss-sysinit
  • amazon-linux-upgrade-nss-tools

References

  • amazon-linux-upgrade-nss
  • amazon-linux-upgrade-nss-debuginfo
  • amazon-linux-upgrade-nss-devel
  • amazon-linux-upgrade-nss-pkcs11-devel
  • amazon-linux-upgrade-nss-sysinit
  • amazon-linux-upgrade-nss-tools

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;