vulnerability
Red Hat: CVE-2016-5285: Moderate: nss and nss-util security update (RHSA-2016:2779)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | 2016-11-16 | 2016-11-16 | 2019-11-25 |
Description
Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.
From RHSA-2016:2779:
Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.
The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries.
The following packages have been upgraded to a newer upstream version: nss (3.21.3), nss-util (3.21.3).
Security Fix(es):
Multiple buffer handling flaws were found in the way NSS handled cryptographicdata from the network. A remote attacker could use these flaws to crash anapplication using NSS or, possibly, execute arbitrary code with the permissionof the user running the application. (CVE-2016-2834)A NULL pointer dereference flaw was found in the way NSS handled invalidDiffie-Hellman keys. A remote client could use this flaw to crash a TLS/SSLserver using NSS. (CVE-2016-5285)It was found that Diffie Hellman Client key exchange handling in NSS wasvulnerable to small subgroup confinement attack. An attacker could use this flawto recover private keys by confining the client DH key to small subgroup of thedesired group. (CVE-2016-8635)
Red Hat would like to thank the Mozilla project for reporting CVE-2016-2834. The CVE-2016-8635 issue was discovered by Hubert Kario (Red Hat). Upstream acknowledges Tyson Smith and Jed Davis as the original reporter of CVE-2016-2834.
Solution(s)
References

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.