Rapid7 Vulnerability & Exploit Database

Amazon Linux AMI: Security patch for nss-util (ALAS-2014-422) (CVE-2014-1568)

Back to Search

Amazon Linux AMI: Security patch for nss-util (ALAS-2014-422) (CVE-2014-1568)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
09/25/2014
Created
07/25/2018
Added
10/06/2014
Modified
07/04/2017

Description

Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a "signature malleability" issue.

Solution(s)

  • amazon-linux-upgrade-nss-util
  • amazon-linux-upgrade-nss-util-debuginfo
  • amazon-linux-upgrade-nss-util-devel

References

  • amazon-linux-upgrade-nss-util
  • amazon-linux-upgrade-nss-util-debuginfo
  • amazon-linux-upgrade-nss-util-devel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;