Search for packages
Package details: pkg:deb/ubuntu/nss@2:3.28.4-0ubuntu0.16.04.3
purl pkg:deb/ubuntu/nss@2:3.28.4-0ubuntu0.16.04.3
Next non-vulnerable version 2:3.49.1-1ubuntu1.5
Latest non-vulnerable version 2:3.49.1-1ubuntu1.5
Risk 4.5
Vulnerabilities affecting this package (23)
Vulnerability Summary Fixed by
VCID-163k-wrg5-aaaf
Aliases:
CVE-2017-11697
The __hash_open function in hash.c:229 in Mozilla Network Security Services (NSS) allows context-dependent attackers to cause a denial of service (floating point exception and crash) via a crafted cert8.db file.
2:3.49.1-1ubuntu1
Affected by 6 other vulnerabilities.
VCID-2sza-nrr3-aaam
Aliases:
CVE-2020-12400
When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
2:3.49.1-1ubuntu1.4
Affected by 1 other vulnerability.
VCID-34n3-7gmm-aaap
Aliases:
CVE-2020-12402
During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.
2:3.45-1ubuntu2.4
Affected by 10 other vulnerabilities.
2:3.49.1-1ubuntu1.2
Affected by 4 other vulnerabilities.
VCID-3ewf-dckr-aaam
Aliases:
CVE-2020-12399
NSS has shown timing differences when performing DSA signatures, which was exploitable and could eventually leak private keys. This vulnerability affects Thunderbird < 68.9.0, Firefox < 77, and Firefox ESR < 68.9.
2:3.45-1ubuntu2.3
Affected by 9 other vulnerabilities.
2:3.49.1-1ubuntu1.1
Affected by 5 other vulnerabilities.
VCID-4bc8-eeb6-aaar
Aliases:
CVE-2019-11729
Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
2:3.45-1ubuntu1
Affected by 14 other vulnerabilities.
VCID-68du-qrk9-aaaq
Aliases:
CVE-2019-17007
In Network Security Services before 3.44, a malformed Netscape Certificate Sequence can cause NSS to crash, resulting in a denial of service.
2:3.45-1ubuntu2
Affected by 13 other vulnerabilities.
VCID-83kk-gd67-aaag
Aliases:
CVE-2018-12384
When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.
2:3.35-2ubuntu2.1
Affected by 18 other vulnerabilities.
VCID-97b8-7cm1-aaaj
Aliases:
CVE-2017-11698
Heap-based buffer overflow in the __get_page function in lib/dbm/src/h_page.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.
2:3.49.1-1ubuntu1
Affected by 6 other vulnerabilities.
VCID-985n-34bg-aaaq
Aliases:
CVE-2020-12401
During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
2:3.49.1-1ubuntu1.4
Affected by 1 other vulnerability.
VCID-b8zr-szzz-aaaa
Aliases:
CVE-2018-18508
In Network Security Services (NSS) before 3.36.7 and before 3.41.1, a malformed signature can cause a crash due to a null dereference, resulting in a Denial of Service.
2:3.35-2ubuntu2.2
Affected by 17 other vulnerabilities.
VCID-d91d-8t7r-aaag
Aliases:
CVE-2018-0495
Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
2:3.35-2ubuntu2.1
Affected by 18 other vulnerabilities.
VCID-dxs2-xsdx-aaad
Aliases:
CVE-2017-7805
During TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. This saved data is used for later messages but in some cases, the handshake transcript can exceed the space available in the current buffer, causing the allocation of a new buffer. This leaves a pointer pointing to the old, freed buffer, resulting in a use-after-free when handshake hashes are then calculated afterwards. This can result in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
2:3.32-1ubuntu3
Affected by 21 other vulnerabilities.
VCID-e56e-1t6d-aaaa
Aliases:
CVE-2019-11727
A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox < 68.
2:3.45-1ubuntu1
Affected by 14 other vulnerabilities.
VCID-fvpt-7dgk-aaaq
Aliases:
CVE-2018-12404
A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41.
2:3.35-2ubuntu2.1
Affected by 18 other vulnerabilities.
VCID-gd1d-srzb-aaae
Aliases:
CVE-2019-17006
In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
2:3.45-1ubuntu2.2
Affected by 11 other vulnerabilities.
VCID-mfgf-bqs7-aaan
Aliases:
CVE-2020-6829
When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
2:3.49.1-1ubuntu1.4
Affected by 1 other vulnerability.
VCID-p8d3-gs41-aaan
Aliases:
CVE-2020-12403
A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
2:3.49.1-1ubuntu1.5
Affected by 0 other vulnerabilities.
VCID-qbz3-r843-aaaf
Aliases:
CVE-2016-2183
VC-OPENSSL-20160824-CVE-2016-2183
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
2:3.28.4-0ubuntu1
Affected by 22 other vulnerabilities.
VCID-re8h-cyhw-aaae
Aliases:
CVE-2019-11745
When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
2:3.45-1ubuntu2.1
Affected by 12 other vulnerabilities.
VCID-s9wu-7hy6-aaaj
Aliases:
CVE-2017-11695
Heap-based buffer overflow in the alloc_segs function in lib/dbm/src/hash.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.
2:3.49.1-1ubuntu1
Affected by 6 other vulnerabilities.
VCID-us3r-6g1m-aaag
Aliases:
CVE-2019-17023
After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored. This vulnerability affects Firefox < 72.
2:3.45-1ubuntu2.3
Affected by 9 other vulnerabilities.
2:3.49.1-1ubuntu1
Affected by 6 other vulnerabilities.
VCID-vx85-68mr-aaaj
Aliases:
CVE-2017-11696
Heap-based buffer overflow in the __hash_open function in lib/dbm/src/hash.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.
2:3.49.1-1ubuntu1
Affected by 6 other vulnerabilities.
VCID-y1t9-w1k3-aaaj
Aliases:
CVE-2019-11719
When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
2:3.45-1ubuntu1
Affected by 14 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version