Vulnerability Details : CVE-2015-7182
Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2015-7182
- cpe:2.3:a:oracle:opensso:3.0-0.7:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:traffic_director:11.1.1.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:traffic_director:11.1.1.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
Threat overview for CVE-2015-7182
Top countries where our scanners detected CVE-2015-7182
Top open port discovered on systems with this issue
443
IPs affected by CVE-2015-7182 705
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2015-7182!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2015-7182
1.73%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 88 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-7182
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2015-7182
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-7182
-
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
NSS 3.19.4 release notes - Mozilla | MDNVendor Advisory
-
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753
The Slackware Linux Project: Slackware Security Advisories
-
http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
openSUSE-SU-2015:2229-1: moderate: Security update for MozillaThunderbir
-
http://www.securityfocus.com/bid/77416
Mozilla Network Security Services Memory Corruption and Heap Buffer Overflow Vulnerabilities
-
http://www.ubuntu.com/usn/USN-2785-1
USN-2785-1: Firefox vulnerabilities | Ubuntu security notices
-
https://security.gentoo.org/glsa/201512-10
Mozilla Products: Multiple vulnerabilities (GLSA 201512-10) — Gentoo security
-
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
cpuapr2016v3Patch
-
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
[security-announce] SUSE-SU-2015:1981-1: important: Security update for
-
http://www.securityfocus.com/bid/91787
Oracle July 2016 Critical Patch Update Multiple Vulnerabilities
-
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Oracle Solaris Bulletin - April 2016
-
http://www.ubuntu.com/usn/USN-2791-1
USN-2791-1: NSS vulnerabilities | Ubuntu security notices
-
http://www.debian.org/security/2015/dsa-3393
Debian -- Security Information -- DSA-3393-1 iceweasel
-
http://www.debian.org/security/2015/dsa-3410
Debian -- Security Information -- DSA-3410-1 icedove
-
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
NSS 3.20.1 release notes - Mozilla | MDNVendor Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-1980.html
RHSA-2015:1980 - Security Advisory - Red Hat Customer Portal
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Oracle Critical Patch Update - October 2017
-
https://bto.bluecoat.com/security-advisory/sa119
SA119 : Multiple NSS Vulnerabilities
-
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
Oracle Critical Patch Update - July 2016
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
Oracle Linux Bulletin - October 2015
-
https://security.gentoo.org/glsa/201605-06
Mozilla Products: Multiple vulnerabilities (GLSA 201605-06) — Gentoo security
-
http://rhn.redhat.com/errata/RHSA-2015-1981.html
RHSA-2015:1981 - Security Advisory - Red Hat Customer Portal
-
http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
NSS and NSPR memory corruption issues — MozillaVendor Advisory
-
http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
Slackware Security Advisory - mozilla-nss Updates ≈ Packet Storm
-
http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
openSUSE-SU-2015:2245-1: moderate: Security update for Mozilla Thunderbi
-
http://www.ubuntu.com/usn/USN-2819-1
USN-2819-1: Thunderbird vulnerabilities | Ubuntu security notices
-
http://www.securitytracker.com/id/1034069
Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Conduct Cross-Site Scripting Attacks - SecurityTrack
-
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
[security-announce] SUSE-SU-2015:1926-1: important: Security update for
-
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
[security-announce] openSUSE-SU-2015:1942-1: important: Security update
-
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
[security-announce] SUSE-SU-2015:2081-1: important: Security update for
-
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
Oracle VM Server for x86 Bulletin - July 2016
-
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
NSS 3.19.2.1 release notes - Mozilla | MDNVendor Advisory
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1202868
1202868 - (CVE-2015-7182) ASN.1 decoder heap overflow when decoding constructed OCTET STRING that mixes indefinite and definite length encodings
-
http://www.debian.org/security/2016/dsa-3688
Debian -- Security Information -- DSA-3688-1 nss
-
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
[security-announce] SUSE-SU-2015:1978-1: important: Security update for
Jump to