2017-10-16 12:31:07 -04:00
{
2019-03-17 22:28:20 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "security@mozilla.org" ,
"ID" : "CVE-2014-1569" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
2017-10-16 12:31:07 -04:00
]
2019-03-17 22:28:20 +00:00
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "The definite_length_decoder function in lib/util/quickder.c in Mozilla Network Security Services (NSS) before 3.16.2.4 and 3.17.x before 3.17.3 does not ensure that the DER encoding of an ASN.1 length is properly formed, which allows remote attackers to conduct data-smuggling attacks by using a long byte sequence for an encoding, as demonstrated by the SEC_QuickDERDecodeItem function's improper handling of an arbitrary-length encoding of 0x00."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1064670" ,
"refsource" : "CONFIRM" ,
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1064670"
} ,
{
"name" : "openSUSE-SU-2015:0138" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html"
} ,
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" ,
"refsource" : "CONFIRM" ,
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
} ,
{
"name" : "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.17.3_release_notes" ,
"refsource" : "CONFIRM" ,
"url" : "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.17.3_release_notes"
} ,
{
"name" : "http://www.intelsecurity.com/resources/wp-berserk-analysis-part-1.pdf" ,
"refsource" : "MISC" ,
"url" : "http://www.intelsecurity.com/resources/wp-berserk-analysis-part-1.pdf"
} ,
{
"name" : "1032909" ,
"refsource" : "SECTRACK" ,
"url" : "http://www.securitytracker.com/id/1032909"
} ,
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" ,
"refsource" : "CONFIRM" ,
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
} ,
{
"name" : "SUSE-SU-2015:0173" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html"
} ,
{
"name" : "SUSE-SU-2015:0171" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html"
} ,
{
"name" : "https://www.imperialviolet.org/2014/09/26/pkcs1.html" ,
"refsource" : "MISC" ,
"url" : "https://www.imperialviolet.org/2014/09/26/pkcs1.html"
} ,
{
"name" : "openSUSE-SU-2015:0404" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html"
} ,
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" ,
"refsource" : "CONFIRM" ,
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
} ,
{
"name" : "DSA-3186" ,
"refsource" : "DEBIAN" ,
"url" : "http://www.debian.org/security/2015/dsa-3186"
} ,
{
"name" : "https://www.reddit.com/r/netsec/comments/2hd1m8/rsa_signature_forgery_in_nss/cksnr02" ,
"refsource" : "MISC" ,
"url" : "https://www.reddit.com/r/netsec/comments/2hd1m8/rsa_signature_forgery_in_nss/cksnr02"
} ,
{
"name" : "SUSE-SU-2015:0180" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html"
}
]
}
}