Vulnerability Details : CVE-2015-7181
The sec_asn1d_parse_leaf function in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, improperly restricts access to an unspecified data structure, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data, related to a "use-after-poison" issue.
Vulnerability category: Execute codeDenial of service
Products affected by CVE-2015-7181
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-7181
27.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-7181
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2015-7181
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-7181
-
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
NSS 3.19.4 release notes - Mozilla | MDNVendor Advisory
-
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753
The Slackware Linux Project: Slackware Security Advisories
-
http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
openSUSE-SU-2015:2229-1: moderate: Security update for MozillaThunderbir
-
http://www.securityfocus.com/bid/77416
Mozilla Network Security Services Memory Corruption and Heap Buffer Overflow Vulnerabilities
-
http://www.ubuntu.com/usn/USN-2785-1
USN-2785-1: Firefox vulnerabilities | Ubuntu security notices
-
https://security.gentoo.org/glsa/201512-10
Mozilla Products: Multiple vulnerabilities (GLSA 201512-10) — Gentoo security
-
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
cpuapr2016v3
-
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
[security-announce] SUSE-SU-2015:1981-1: important: Security update for
-
http://www.securityfocus.com/bid/91787
Oracle July 2016 Critical Patch Update Multiple Vulnerabilities
-
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Oracle Solaris Bulletin - April 2016
-
http://www.ubuntu.com/usn/USN-2791-1
USN-2791-1: NSS vulnerabilities | Ubuntu security notices
-
http://www.debian.org/security/2015/dsa-3393
Debian -- Security Information -- DSA-3393-1 iceweasel
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1192028
1192028 - (CVE-2015-7181) ASan: use-after-poison in sec_asn1d_parse_leaf()
-
http://www.debian.org/security/2015/dsa-3410
Debian -- Security Information -- DSA-3410-1 icedove
-
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
NSS 3.20.1 release notes - Mozilla | MDNVendor Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-1980.html
RHSA-2015:1980 - Security Advisory - Red Hat Customer Portal
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Oracle Critical Patch Update - October 2017
-
https://bto.bluecoat.com/security-advisory/sa119
SA119 : Multiple NSS Vulnerabilities
-
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
Oracle Critical Patch Update - July 2016
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
Oracle Linux Bulletin - October 2015
-
https://security.gentoo.org/glsa/201605-06
Mozilla Products: Multiple vulnerabilities (GLSA 201605-06) — Gentoo security
-
http://rhn.redhat.com/errata/RHSA-2015-1981.html
RHSA-2015:1981 - Security Advisory - Red Hat Customer Portal
-
http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
NSS and NSPR memory corruption issues — MozillaVendor Advisory
-
http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
Slackware Security Advisory - mozilla-nss Updates ≈ Packet Storm
-
http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
openSUSE-SU-2015:2245-1: moderate: Security update for Mozilla Thunderbi
-
http://www.ubuntu.com/usn/USN-2819-1
USN-2819-1: Thunderbird vulnerabilities | Ubuntu security notices
-
http://www.securitytracker.com/id/1034069
Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks - SecurityTrack
-
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
[security-announce] SUSE-SU-2015:1926-1: important: Security update for
-
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
[security-announce] openSUSE-SU-2015:1942-1: important: Security update
-
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
[security-announce] SUSE-SU-2015:2081-1: important: Security update for
-
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
Oracle VM Server for x86 Bulletin - July 2016
-
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
NSS 3.19.2.1 release notes - Mozilla | MDNVendor Advisory
-
http://www.debian.org/security/2016/dsa-3688
Debian -- Security Information -- DSA-3688-1 nss
-
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
[security-announce] SUSE-SU-2015:1978-1: important: Security update for
Jump to