Cryptographic issues in developer.mozilla nss



| Updated: 2020-07-28
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2016-1938
CWE-ID CWE-310
Exploitation vector Network
Public exploit N/A
Vulnerable software
Mozilla NSS
Universal components / Libraries / Libraries used by multiple products

Vendor Mozilla

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Cryptographic issues

EUVDB-ID: #VU32328

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2016-1938

CWE-ID: CWE-310 - Cryptographic Issues

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The s_mp_div function in lib/freebl/mpi/mpi.c in Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, improperly divides numbers, which might make it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging use of the (1) mp_div or (2) mp_exptmod function.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Mozilla NSS: 3.13.4 - 3.52.1

CPE2.3 External links

https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
https://www.debian.org/security/2016/dsa-3688
https://www.mozilla.org/security/announce/2016/mfsa2016-07.html
https://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
https://www.securityfocus.com/bid/81955
https://www.securityfocus.com/bid/91787
https://www.securitytracker.com/id/1034825
https://www.ubuntu.com/usn/USN-2880-1
https://www.ubuntu.com/usn/USN-2880-2
https://www.ubuntu.com/usn/USN-2903-1
https://www.ubuntu.com/usn/USN-2903-2
https://www.ubuntu.com/usn/USN-2973-1
https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1190248
https://bugzilla.mozilla.org/show_bug.cgi?id=1194947
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes
https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c
https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c
https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
https://security.gentoo.org/glsa/201605-06
https://security.gentoo.org/glsa/201701-46


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###