The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

cybersecurity bulletin CVE-2017-7805

Mozilla NSS: use after free via Verifying Client Authentication

Synthesis of the vulnerability

An attacker can force the usage of a freed memory area via Verifying Client Authentication of Mozilla NSS, in order to trigger a denial of service, and possibly to run code.
Severity of this weakness: 4/4.
Creation date: 29/09/2017.
Références of this bulletin: bulletinoct2017, cpuapr2018, cpuoct2018, CVE-2017-7805, DLA-1118-1, DLA-1138-1, DSA-3987-1, DSA-3998-1, FEDORA-2017-2e7badfe67, FEDORA-2017-6e2071419d, FEDORA-2019-7f7489dc8c, MFSA-2017-21, MFSA-2017-22, openSUSE-SU-2017:2615-1, openSUSE-SU-2017:2707-1, openSUSE-SU-2017:2710-1, RHSA-2017:2831-01, RHSA-2017:2832-01, SSA:2017-271-01, SSA:2019-247-01, SUSE-SU-2017:2688-1, SUSE-SU-2017:2872-1, SUSE-SU-2017:2872-2, USN-3431-1, USN-3435-1, USN-3435-2, USN-3436-1, VIGILANCE-VUL-23976.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can force the usage of a freed memory area via Verifying Client Authentication of Mozilla NSS, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

This cybersecurity weakness impacts software or systems such as Debian, Fedora, Firefox, NSS, SeaMonkey, openSUSE Leap, Oracle Communications, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Solaris, Tuxedo, Oracle Virtual Directory, WebLogic, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.

Our Vigil@nce team determined that the severity of this security vulnerability is critical.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this vulnerability bulletin.

Solutions for this threat

Mozilla NSS: version 3.33.
The version 3.33 is fixed:
  https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_33_RTM/src/

Debian: new firefox-esr packages.
New packages are available:
  Debian 7: firefox-esr 52.4.0esr-2~deb7u1
  Debian 8: firefox-esr 52.4.0esr-1~deb8u1
  Debian 9: firefox-esr 52.4.0esr-1~deb9u1

Debian: new nss packages.
New packages are available:
  Debian 7: nss 2:3.26-1+debu7u5
  Debian 8: nss 2:3.26-1+debu8u3
  Debian 9: nss 2:3.26.2-1.1+deb9u1

Fedora 30: new seamonkey packages.
New packages are available:
  Fedora 30: seamonkey 2.49.5-1.fc30

Fedora: new seamonkey packages.
New packages are available:
  Fedora 25: seamonkey 2.49.1-1.fc25
  Fedora 26: seamonkey 2.49.1-1.fc26

Firefox: version 52.4.
The version 52.4 is fixed:
  https://www.mozilla.org/firefox/

Firefox: version 56.
The version 56 is fixed:
  https://www.mozilla.org/firefox/

openSUSE Leap: new MozillaFirefox packages.
New packages are available:
  openSUSE Leap 42.2: MozillaFirefox 52.4.0-57.18.2, mozilla-nss 3.28.6-40.10.1
  openSUSE Leap 42.3: MozillaFirefox 52.4.0-63.2, mozilla-nss 3.28.6-44.1

openSUSE Leap: new MozillaThunderbird packages.
New packages are available:
  openSUSE Leap 42.2: MozillaThunderbird 52.4.0-41.18.1
  openSUSE Leap 42.3: MozillaThunderbird 52.4.0-47.1

Oracle Communications: CPU of April 2018.
A Critical Patch Update is available:
  http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html

Oracle Fusion Middleware: CPU of Octobre 2018.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2433477.1

Oracle Solaris: patch for third party software of October 2017 v1.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

RHEL: new firefox packages.
New packages are available:
  RHEL 6: firefox 52.4.0-1.el6_9
  RHEL 7: firefox 52.4.0-1.el7_4

RHEL: new nss packages.
New packages are available:
  RHEL 6: nss 3.28.4-4.el6_9
  RHEL 7: nss 3.28.4-12.el7_4

SeaMonkey: version 2.49.1.
The version 2.49.1 is fixed:
  https://www.seamonkey-project.org/

SeaMonkey: version 2.49.5.
The version 2.49.5 is fixed:
  http://www.seamonkey-project.org/

Slackware: new mozilla-firefox packages.
New packages are available:
  Slackware 14.2: mozilla-firefox 52.4.0esr-*-1_slack14.2

Slackware: new seamonkey packages.
New packages are available:
  Slackware 14.2: seamonkey 2.49.5-*-1_slack14.2

SUSE LE 12: new MozillaThunderbird packages.
New packages are available:
  SUSE LE 12 RTM-SP3: MozillaThunderbird 52.4.0-45.1

SUSE LE: new MozillaFirefox packages.
New packages are available:
  SUSE LE 11 SP3: MozillaFirefox 52.4.0esr-72.13.2, mozilla-nss 3.29.5-47.6.1
  SUSE LE 11 SP4: MozillaFirefox 52.4.0esr-72.13.2, mozilla-nss 3.29.5-47.6.1
  SUSE LE 12 RTM: MozillaFirefox 52.4.0esr-109.6.2, mozilla-nss 3.29.5-58.3.1
  SUSE LE 12 SP1: MozillaFirefox 52.4.0esr-109.6.2, mozilla-nss 3.29.5-58.3.1
  SUSE LE 12 SP2: MozillaFirefox 52.4.0esr-109.6.2, mozilla-nss 3.29.5-58.3.1
  SUSE LE 12 SP3: MozillaFirefox 52.4.0esr-109.6.2, mozilla-nss 3.29.5-58.3.1

Ubuntu: new firefox packages.
New packages are available:
  Ubuntu 17.04: firefox 56.0+build6-0ubuntu0.17.04.2
  Ubuntu 16.04 LTS: firefox 56.0+build6-0ubuntu0.16.04.2
  Ubuntu 14.04 LTS: firefox 56.0+build6-0ubuntu0.14.04.2

Ubuntu: new libnss3 packages.
New packages are available:
  Ubuntu 17.04: libnss3 2:3.28.4-0ubuntu0.17.04.3
  Ubuntu 16.04 LTS: libnss3 2:3.28.4-0ubuntu0.16.04.3
  Ubuntu 14.04 LTS: libnss3 2:3.28.4-0ubuntu0.14.04.3

Ubuntu: new thunderbird packages.
New packages are available:
  Ubuntu 17.04: thunderbird 1:52.4.0+build1-0ubuntu0.17.04.2
  Ubuntu 16.04 LTS: thunderbird 1:52.4.0+build1-0ubuntu0.16.04.2
  Ubuntu 14.04 LTS: thunderbird 1:52.4.0+build1-0ubuntu0.14.04.2
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a computers vulnerabilities announce. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.