ID

VAR-201409-0340


CVE

CVE-2014-1568


TITLE

Mozilla Network Security Services (NSS) fails to properly verify RSA signatures

Trust: 0.8

sources: CERT/CC: VU#772676

DESCRIPTION

Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a "signature malleability" issue. The Mozilla Network Security Services (NSS) library fails to properly verify RSA signatures due to incorrect ASN.1 parsing of DigestInfo. This vulnerability may allow an attacker to forge a RSA signature, such as a SSL certificate. ============================================================================ Ubuntu Security Notice USN-2360-2 September 24, 2014 thunderbird vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS Summary: Fraudulent security certificates could allow sensitive information to be exposed when accessing the Internet. Software Description: - thunderbird: Mozilla Open Source mail and newsgroup client Details: USN-2360-1 fixed vulnerabilities in Firefox. This update provides the corresponding updates for Thunderbird. Original advisory details: Antoine Delignat-Lavaud and others discovered that NSS incorrectly handled parsing ASN.1 values. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS: thunderbird 1:31.1.2+build1-0ubuntu0.14.04.1 Ubuntu 12.04 LTS: thunderbird 1:31.1.2+build1-0ubuntu0.12.04.1 After a standard system update you need to restart Thunderbird to make all the necessary changes. For the stable distribution (wheezy), this problem has been fixed in version 24.8.1esr-1~deb7u1. For the testing distribution (jessie) and unstable distribution (sid), Icedove uses the system NSS library, handled in DSA 3033-1. He discovered that NSS is vulnerable to a variant of a signature forgery attack previously published by Daniel Bleichenbacher. This is due to lenient parsing of ASN.1 values involved in a signature and could lead to the forging of RSA certificates (CVE-2014-1568). -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: rhev-hypervisor6 security update Advisory ID: RHSA-2014:1354-01 Product: Red Hat Enterprise Virtualization Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1354.html Issue date: 2014-10-02 CVE Names: CVE-2014-1568 CVE-2014-6271 CVE-2014-7169 CVE-2014-7186 CVE-2014-7187 ===================================================================== 1. Summary: An updated rhev-hypervisor6 package that fixes several security issues is now available. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEV-M 3.4 - noarch 3. Description: The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes everything necessary to run and manage virtual machines: a subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent. Note: Red Hat Enterprise Virtualization Hypervisor is only available for the Intel 64 and AMD64 architectures with virtualization extensions. A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue. (CVE-2014-6271) It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue. (CVE-2014-7169) A flaw was found in the way NSS parsed ASN.1 (Abstract Syntax Notation One) input from certain RSA signatures. (CVE-2014-1568) It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code. (CVE-2014-7186) An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash. (CVE-2014-7187) Red Hat would like to thank Stephane Chazelas for reporting CVE-2014-6271, and the Mozilla project for reporting CVE-2014-1568. Upstream acknowledges Antoine Delignat-Lavaud and Intel Product Security Incident Response Team as the original reporters of CVE-2014-1568. The CVE-2014-7186 and CVE-2014-7187 issues were discovered by Florian Weimer of Red Hat Product Security. Users of the Red Hat Enterprise Virtualization Hypervisor are advised to upgrade to this updated package. 4. Solution: This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258 To upgrade Hypervisors in Red Hat Enterprise Virtualization environments using the disk image provided by this package, refer to: https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/ht ml/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Ente rprise_Virtualization_Hypervisors.html 5. Bugs fixed (https://bugzilla.redhat.com/): 1141597 - CVE-2014-6271 bash: specially-crafted environment variables can be used to inject shell commands 1145429 - CVE-2014-1568 nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73) 1146319 - CVE-2014-7169 bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271) 1146791 - CVE-2014-7186 bash: parser can allow out-of-bounds memory access while handling redir_stack 1146804 - CVE-2014-7187 bash: off-by-one error in deeply nested flow control constructs 6. Package List: RHEV-M 3.4: Source: rhev-hypervisor6-6.5-20140930.1.el6ev.src.rpm noarch: rhev-hypervisor6-6.5-20140930.1.el6ev.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-1568.html https://www.redhat.com/security/data/cve/CVE-2014-6271.html https://www.redhat.com/security/data/cve/CVE-2014-7169.html https://www.redhat.com/security/data/cve/CVE-2014-7186.html https://www.redhat.com/security/data/cve/CVE-2014-7187.html https://access.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFULad7XlSAg2UNWIIRArccAJ95pkvG2fyfrI6g4Ve/+fAdnbQq2QCffmYR IH3VLRMcNTi5Gr1GmWlBiFg= =DD5a -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:059 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : nss Date : March 13, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: Multiple vulnerabilities has been found and corrected in the Mozilla NSS and NSPR packages: The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) before 3.16 accepts a wildcard character that is embedded in an internationalized domain name&#039;s U-label, which might allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate (CVE-2014-1492). Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger certain improper removal of an NSSCertificate structure from a trust domain (CVE-2014-1544). The definite_length_decoder function in lib/util/quickder.c in Mozilla Network Security Services (NSS) before 3.16.2.4 and 3.17.x before 3.17.3 does not ensure that the DER encoding of an ASN.1 length is properly formed, which allows remote attackers to conduct data-smuggling attacks by using a long byte sequence for an encoding, as demonstrated by the SEC_QuickDERDecodeItem function&#039;s improper handling of an arbitrary-length encoding of 0x00 (CVE-2014-1569). Mozilla Netscape Portable Runtime (NSPR) before 4.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via vectors involving the sprintf and console functions (CVE-2014-1545). The sqlite3 packages have been upgraded to the 3.8.6 version due to an prerequisite to nss-3.17.x. Additionally the rootcerts package has also been updated to the latest version as of 2014-11-17, which adds, removes, and distrusts several certificates. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1569 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.16_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.16.1_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.16.2_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.16.3_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.17_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.17.1_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.17.2_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.17.3_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.17.4_release_notes https://www.mozilla.org/en-US/security/advisories/mfsa2014-55/ _______________________________________________________________________ Updated Packages: Mandriva Business Server 2/X86_64: 2aea53da7622f23ec03faa5605d9672c mbs2/x86_64/lemon-3.8.6-1.mbs2.x86_64.rpm 68cc94d4a95146583d8a6b2849759614 mbs2/x86_64/lib64nspr4-4.10.8-1.mbs2.x86_64.rpm a6ffe2ebe6de847b6227c8c4c2cb4ba4 mbs2/x86_64/lib64nspr-devel-4.10.8-1.mbs2.x86_64.rpm 78ba63e6a21b897abac8e4b0e975470d mbs2/x86_64/lib64nss3-3.17.4-1.mbs2.x86_64.rpm aacf8b1f144a7044e77abc5d0be72a7b mbs2/x86_64/lib64nss-devel-3.17.4-1.mbs2.x86_64.rpm 6afff220f7fa93dede0486b76155ae44 mbs2/x86_64/lib64nss-static-devel-3.17.4-1.mbs2.x86_64.rpm 63ffb7675dc414a52a4647f5ed302e3c mbs2/x86_64/lib64sqlite3_0-3.8.6-1.mbs2.x86_64.rpm cfefad1ef4f83cceeeb34a4f2ffca442 mbs2/x86_64/lib64sqlite3-devel-3.8.6-1.mbs2.x86_64.rpm e976251ee0ae5c2b2a2f6a163b693e85 mbs2/x86_64/lib64sqlite3-static-devel-3.8.6-1.mbs2.x86_64.rpm 42018611a17d2b6480b63f0a968a796d mbs2/x86_64/nss-3.17.4-1.mbs2.x86_64.rpm b955454c30e482635944134eb02456e4 mbs2/x86_64/nss-doc-3.17.4-1.mbs2.noarch.rpm 3058267964146b7806c493ff536da63d mbs2/x86_64/rootcerts-20141117.00-1.mbs2.x86_64.rpm 18fc28f1ae18ddd5fe01acb77811d0e6 mbs2/x86_64/rootcerts-java-20141117.00-1.mbs2.x86_64.rpm 200f6a413d13d850ea084a9e42c4fc23 mbs2/x86_64/sqlite3-tcl-3.8.6-1.mbs2.x86_64.rpm 8c88a446098d21cf2675173e32a208e6 mbs2/x86_64/sqlite3-tools-3.8.6-1.mbs2.x86_64.rpm 2e494a940c3189617ff62bc15a2b14fb mbs2/SRPMS/nspr-4.10.8-1.mbs2.src.rpm 0a28d1c9c07909d488c7dabe92c47529 mbs2/SRPMS/nss-3.17.4-1.mbs2.src.rpm 10dcc357bb0bbdc22e7dd308074d037b mbs2/SRPMS/rootcerts-20141117.00-1.mbs2.src.rpm df412cc892bb40e1d7345079a25c0bbb mbs2/SRPMS/sqlite3-3.8.6-1.mbs2.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/en/support/security/advisories/ If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFVAvuLmqjQ0CJFipgRArOfAKDn7F7m/ZnJATspmFD0k083yGXQJwCdHAzw P1QqaGn3HFIH8gKR7XVcRAA= =ZF+9 -----END PGP SIGNATURE-----

Trust: 2.34

sources: NVD: CVE-2014-1568 // CERT/CC: VU#772676 // VULHUB: VHN-69507 // VULMON: CVE-2014-1568 // PACKETSTORM: 128390 // PACKETSTORM: 128471 // PACKETSTORM: 128404 // PACKETSTORM: 128537 // PACKETSTORM: 128389 // PACKETSTORM: 130825

AFFECTED PRODUCTS

vendor:mozillamodel:seamonkeyscope:eqversion:2.13.1

Trust: 1.6

vendor:mozillamodel:seamonkeyscope:eqversion:2.15

Trust: 1.6

vendor:mozillamodel:seamonkeyscope:eqversion:2.14

Trust: 1.6

vendor:mozillamodel:seamonkeyscope:eqversion:2.13.2

Trust: 1.6

vendor:mozillamodel:seamonkeyscope:eqversion:2.15.1

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.12

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.12.10

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.5

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.5.0.8

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:37.0.2062.3

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:31.0

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:32.0.1

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:32.0.2

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.13

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.16

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:31.0

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.5.0.9

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.6

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.11

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.14

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.24

Trust: 1.0

vendor:googlemodel:chromescope:lteversion:37.0.2062.120

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.12

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.13

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.12.9

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.12.3.2

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.16

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.25

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.19

Trust: 1.0

vendor:mozillamodel:firefoxscope:lteversion:32.0

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.7.2

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.7.3

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.8

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.22

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:lteversion:24.8.0

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.15.4

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.14.2

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.20

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.0

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.10

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.4

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.14.5

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.7

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.7

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.12.1

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.10

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.13

Trust: 1.0

vendor:mozillamodel:firefox esrscope:eqversion:24.8.0

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.2

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.10

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.12

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.12.3

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:lteversion:2.29

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.6

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.14.1

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.3

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.1

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.12.8

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.26

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.14

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.3

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.4.1

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.12.11

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.4

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.15

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.8

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.12.2

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.15.1

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.1

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.16

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.15

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.12.4

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.15.2

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.14

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.0

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.7

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion:31.1.0

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:31.1.0

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.7.7

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.11.5

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.17

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.10.1

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.9

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.4

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.2

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.15.5

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.21

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.6

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.22.1

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.12.7

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.11.2

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.2

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.23

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:37.0.2062.100

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.12.6

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.19

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.14.3

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:*

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.17

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.16.2

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.15.3.1

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.7

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.3

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.2

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.6

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.3

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.12.1

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.12

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:37.0.2062.20

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.18

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.5

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.7.1

Trust: 1.0

vendor:googlemodel:chromescope:lteversion:37.0.2062.103

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.16.4

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.1

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.4

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.16.1

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.9

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.11.4

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.14.4

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:37.0.2062.0

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.7.5

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.6.1

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.1

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.12.3.1

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.11.3

Trust: 1.0

vendor:mozillamodel:network security servicesscope:lteversion:3.16.2.0

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.9

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.12.5

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.8

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.3.1

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.11

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.18

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.8

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.15.2

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.2.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:37.0.2062.102

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.17.1

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.16.3

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.16.1

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1.9

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.5.0.10

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion:31.1.1

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.5

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.3.2

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.5

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.4.2

Trust: 1.0

vendor:mozillamodel:network security servicesscope:eqversion:3.15.3

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:1.1

Trust: 1.0

vendor:mozillamodel:seamonkeyscope:eqversion:2.0.11

Trust: 1.0

vendor:googlemodel: - scope: - version: -

Trust: 0.8

vendor:mozillamodel: - scope: - version: -

Trust: 0.8

sources: CERT/CC: VU#772676 // CNNVD: CNNVD-201409-965 // NVD: CVE-2014-1568

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-1568
value: HIGH

Trust: 1.0

NVD: CVE-2014-1568
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201409-965
value: HIGH

Trust: 0.6

VULHUB: VHN-69507
value: HIGH

Trust: 0.1

VULMON: CVE-2014-1568
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-1568
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: CVE-2014-1568
severity: HIGH
baseScore: 8.8
vectorString: NONE
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-69507
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#772676 // VULHUB: VHN-69507 // VULMON: CVE-2014-1568 // CNNVD: CNNVD-201409-965 // NVD: CVE-2014-1568

PROBLEMTYPE DATA

problemtype:CWE-310

Trust: 1.1

sources: VULHUB: VHN-69507 // NVD: CVE-2014-1568

THREAT TYPE

remote

Trust: 0.9

sources: PACKETSTORM: 128438 // PACKETSTORM: 128537 // PACKETSTORM: 128629 // CNNVD: CNNVD-201409-965

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201409-965

EXPLOIT AVAILABILITY

sources: CERT/CC: VU#772676 // VULHUB: VHN-69507

PATCH

title:37.0.2062.124_chrome_installerurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54762

Trust: 0.6

title:nss-3.16.5url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54742

Trust: 0.6

title:firefox-32.0.3.sourceurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54746

Trust: 0.6

title:Firefox Setup 31.1.1esrurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54750

Trust: 0.6

title:Thunderbird 24.8.1url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54754

Trust: 0.6

title:thunderbird-31.1.2.sourceurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54758

Trust: 0.6

title:nss-3.16.2.1url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54741

Trust: 0.6

title:Firefox 32.0.3url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54745

Trust: 0.6

title:firefox-24.8.1esr.sourceurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54749

Trust: 0.6

title:Thunderbird Setup 24.8.1url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54753

Trust: 0.6

title:Thunderbird 31.1.2url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54757

Trust: 0.6

title:seamonkey-2.29.1.sourceurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54761

Trust: 0.6

title:Firefox Setup 32.0.3url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54744

Trust: 0.6

title:Firefox 24.8.1esrurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54748

Trust: 0.6

title:firefox-31.1.1esr.sourceurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54752

Trust: 0.6

title:Thunderbird Setup 31.1.2url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54756

Trust: 0.6

title:SeaMonkey 2.29.1url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54760

Trust: 0.6

title:nss-3.17.1url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54743

Trust: 0.6

title:Firefox Setup 24.8.1esrurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54747

Trust: 0.6

title:Firefox 31.1.1esrurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54751

Trust: 0.6

title:thunderbird-24.8.1.sourceurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54755

Trust: 0.6

title:SeaMonkey Setup 2.29.1url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54759

Trust: 0.6

title:37.0.2062.120_chrome_installer_win64url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54763

Trust: 0.6

title:Ubuntu Security Notice: nss vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2361-1

Trust: 0.1

title:Ubuntu Security Notice: thunderbird vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2360-2

Trust: 0.1

title:Ubuntu Security Notice: firefox vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2360-1

Trust: 0.1

title:Debian Security Advisories: DSA-3037-1 icedove -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=0cdafb45f65b45c32ba28a252cf69aca

Trust: 0.1

title:Debian Security Advisories: DSA-3033-1 nss -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=95a616cbe615a00b3319e7f0c0cc52a9

Trust: 0.1

title:Debian Security Advisories: DSA-3034-1 iceweasel -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=0b8977bbd67dd6b7595c4a471981c654

Trust: 0.1

title:Amazon Linux AMI: ALAS-2014-422url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-422

Trust: 0.1

title:Amazon Linux AMI: ALAS-2014-423url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-423

Trust: 0.1

title:Mozilla: Mozilla Foundation Security Advisory 2014-73url:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=2014-73

Trust: 0.1

title:Amazon Linux AMI: ALAS-2014-424url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-424

Trust: 0.1

title:Red Hat: CVE-2014-1568url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2014-1568

Trust: 0.1

title:Symantec Security Advisories: SA84 : BERserk NSS Signature Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=f467357487965e566960830bb4f9f807

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - April 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=4b527561ba1a5de7a529c8a93679f585

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=4a692d6d60aa31507cb101702b494c51

Trust: 0.1

title:Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - July 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins&qid=6c15273f6bf4a785175f27073b98a1ce

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - July 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=459961024c4bdce7bb3a1a40a65a6f2e

Trust: 0.1

title:Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - April 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=976a4da35d55283870dbb31b88a6c655

Trust: 0.1

title:Publicationsurl:https://github.com/abazhaniuk/Publications

Trust: 0.1

sources: VULMON: CVE-2014-1568 // CNNVD: CNNVD-201409-965

EXTERNAL IDS

db:NVDid:CVE-2014-1568

Trust: 2.6

db:CERT/CCid:VU#772676

Trust: 2.0

db:JUNIPERid:JSA10761

Trust: 1.2

db:JUNIPERid:JSA10698

Trust: 1.2

db:SECUNIAid:61540

Trust: 1.2

db:SECUNIAid:61575

Trust: 1.2

db:SECUNIAid:61583

Trust: 1.2

db:SECUNIAid:61574

Trust: 1.2

db:SECUNIAid:61576

Trust: 1.2

db:BIDid:70116

Trust: 1.2

db:CNNVDid:CNNVD-201409-965

Trust: 0.7

db:PACKETSTORMid:128537

Trust: 0.2

db:PACKETSTORMid:128389

Trust: 0.2

db:PACKETSTORMid:128390

Trust: 0.2

db:PACKETSTORMid:128629

Trust: 0.2

db:PACKETSTORMid:128471

Trust: 0.2

db:PACKETSTORMid:128404

Trust: 0.2

db:PACKETSTORMid:128438

Trust: 0.2

db:PACKETSTORMid:128391

Trust: 0.1

db:PACKETSTORMid:128400

Trust: 0.1

db:PACKETSTORMid:128401

Trust: 0.1

db:VULHUBid:VHN-69507

Trust: 0.1

db:VULMONid:CVE-2014-1568

Trust: 0.1

db:PACKETSTORMid:130825

Trust: 0.1

sources: CERT/CC: VU#772676 // VULHUB: VHN-69507 // VULMON: CVE-2014-1568 // PACKETSTORM: 128390 // PACKETSTORM: 128471 // PACKETSTORM: 128404 // PACKETSTORM: 128438 // PACKETSTORM: 128537 // PACKETSTORM: 128389 // PACKETSTORM: 130825 // PACKETSTORM: 128629 // CNNVD: CNNVD-201409-965 // NVD: CVE-2014-1568

REFERENCES

url:http://www.mozilla.org/security/announce/2014/mfsa2014-73.html

Trust: 3.5

url:https://bugzilla.mozilla.org/show_bug.cgi?id=1069405

Trust: 2.6

url:https://bugzilla.mozilla.org/show_bug.cgi?id=1064636

Trust: 2.6

url:http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html

Trust: 1.8

url:http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html

Trust: 1.8

url:http://www.kb.cert.org/vuls/id/772676

Trust: 1.3

url:http://rhn.redhat.com/errata/rhsa-2014-1307.html

Trust: 1.3

url:http://rhn.redhat.com/errata/rhsa-2014-1354.html

Trust: 1.3

url:http://rhn.redhat.com/errata/rhsa-2014-1371.html

Trust: 1.3

url:http://www.ubuntu.com/usn/usn-2360-1

Trust: 1.3

url:http://www.ubuntu.com/usn/usn-2360-2

Trust: 1.3

url:http://www.ubuntu.com/usn/usn-2361-1

Trust: 1.3

url:http://www.securityfocus.com/bid/70116

Trust: 1.2

url:http://www.novell.com/support/kb/doc.php?id=7015701

Trust: 1.2

url:http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html

Trust: 1.2

url:http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html

Trust: 1.2

url:http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

Trust: 1.2

url:http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html

Trust: 1.2

url:http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

Trust: 1.2

url:http://www.debian.org/security/2014/dsa-3033

Trust: 1.2

url:http://www.debian.org/security/2014/dsa-3034

Trust: 1.2

url:http://www.debian.org/security/2014/dsa-3037

Trust: 1.2

url:https://security.gentoo.org/glsa/201504-01

Trust: 1.2

url:http://secunia.com/advisories/61540

Trust: 1.2

url:http://secunia.com/advisories/61574

Trust: 1.2

url:http://secunia.com/advisories/61575

Trust: 1.2

url:http://secunia.com/advisories/61576

Trust: 1.2

url:http://secunia.com/advisories/61583

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/96194

Trust: 1.2

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10698

Trust: 1.1

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10761

Trust: 1.1

url:https://developer.mozilla.org/en-us/docs/mozilla/projects/nss

Trust: 0.8

url:https://developer.mozilla.org/en-us/docs/mozilla/projects/nss/nss_releases

Trust: 0.8

url:https://www.ietf.org/rfc/rfc2313.txt

Trust: 0.8

url:http://en.wikipedia.org/wiki/pkcs#1

Trust: 0.8

url:http://www.imc.org/ietf-openpgp/mail-archive/msg06063.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-1568

Trust: 0.8

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.3

url:https://www.redhat.com/security/data/cve/cve-2014-1568.html

Trust: 0.3

url:https://access.redhat.com/security/team/key/#package

Trust: 0.3

url:https://bugzilla.redhat.com/):

Trust: 0.3

url:https://access.redhat.com/articles/11258

Trust: 0.3

url:https://access.redhat.com/security/team/contact/

Trust: 0.3

url:http://www.debian.org/security/

Trust: 0.2

url:http://www.mandriva.com/en/support/security/

Trust: 0.2

url:http://www.mandriva.com/en/support/security/advisories/

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1568

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.2

url:http://kb.juniper.net/infocenter/index?page=content&amp;id=jsa10698

Trust: 0.1

url:http://kb.juniper.net/infocenter/index?page=content&amp;id=jsa10761

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/310.html

Trust: 0.1

url:https://usn.ubuntu.com/2361-1/

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2014-1568

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/thunderbird/1:31.1.2+build1-0ubuntu0.12.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/thunderbird/1:31.1.2+build1-0ubuntu0.14.04.1

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-7169.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-7186.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7186

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-7187.html

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/ht

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7169

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6271

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2014-6271.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7187

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/nss/2:3.17.1-0ubuntu0.14.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/nss/3.17.1-0ubuntu0.10.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/nss/3.17.1-0ubuntu0.12.04.1

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1492

Trust: 0.1

url:https://developer.mozilla.org/en-us/docs/mozilla/projects/nss/nss_3.16.2_release_notes

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1492

Trust: 0.1

url:https://developer.mozilla.org/en-us/docs/mozilla/projects/nss/nss_3.17.2_release_notes

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2014-55/

Trust: 0.1

url:https://developer.mozilla.org/en-us/docs/mozilla/projects/nss/nss_3.17.1_release_notes

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1544

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1569

Trust: 0.1

url:https://developer.mozilla.org/en-us/docs/mozilla/projects/nss/nss_3.17_release_notes

Trust: 0.1

url:https://developer.mozilla.org/en-us/docs/mozilla/projects/nss/nss_3.16_release_notes

Trust: 0.1

url:https://developer.mozilla.org/en-us/docs/mozilla/projects/nss/nss_3.16.1_release_notes

Trust: 0.1

url:https://developer.mozilla.org/en-us/docs/mozilla/projects/nss/nss_3.17.3_release_notes

Trust: 0.1

url:https://developer.mozilla.org/en-us/docs/mozilla/projects/nss/nss_3.16.3_release_notes

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1569

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1545

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1545

Trust: 0.1

url:https://developer.mozilla.org/en-us/docs/mozilla/projects/nss/nss_3.17.4_release_notes

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1544

Trust: 0.1

sources: CERT/CC: VU#772676 // VULHUB: VHN-69507 // VULMON: CVE-2014-1568 // PACKETSTORM: 128390 // PACKETSTORM: 128471 // PACKETSTORM: 128404 // PACKETSTORM: 128438 // PACKETSTORM: 128537 // PACKETSTORM: 128389 // PACKETSTORM: 130825 // PACKETSTORM: 128629 // CNNVD: CNNVD-201409-965 // NVD: CVE-2014-1568

CREDITS

Red Hat

Trust: 0.3

sources: PACKETSTORM: 128438 // PACKETSTORM: 128537 // PACKETSTORM: 128629

SOURCES

db:CERT/CCid:VU#772676
db:VULHUBid:VHN-69507
db:VULMONid:CVE-2014-1568
db:PACKETSTORMid:128390
db:PACKETSTORMid:128471
db:PACKETSTORMid:128404
db:PACKETSTORMid:128438
db:PACKETSTORMid:128537
db:PACKETSTORMid:128389
db:PACKETSTORMid:130825
db:PACKETSTORMid:128629
db:CNNVDid:CNNVD-201409-965
db:NVDid:CVE-2014-1568

LAST UPDATE DATE

2025-06-26T20:27:17.352000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#772676date:2014-09-24T00:00:00
db:VULHUBid:VHN-69507date:2017-08-29T00:00:00
db:VULMONid:CVE-2014-1568date:2017-08-29T00:00:00
db:CNNVDid:CNNVD-201409-965date:2014-10-22T00:00:00
db:NVDid:CVE-2014-1568date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CERT/CCid:VU#772676date:2014-09-24T00:00:00
db:VULHUBid:VHN-69507date:2014-09-25T00:00:00
db:VULMONid:CVE-2014-1568date:2014-09-25T00:00:00
db:PACKETSTORMid:128390date:2014-09-25T00:06:20
db:PACKETSTORMid:128471date:2014-09-30T00:19:30
db:PACKETSTORMid:128404date:2014-09-25T15:14:25
db:PACKETSTORMid:128438date:2014-09-26T14:41:23
db:PACKETSTORMid:128537date:2014-10-03T00:57:40
db:PACKETSTORMid:128389date:2014-09-25T00:06:10
db:PACKETSTORMid:130825date:2015-03-16T15:40:11
db:PACKETSTORMid:128629date:2014-10-10T23:23:00
db:CNNVDid:CNNVD-201409-965date:2014-09-28T00:00:00
db:NVDid:CVE-2014-1568date:2014-09-25T17:55:04.387