Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2016-1938 |
CWE-ID | CWE-310 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Mozilla NSS Universal components / Libraries / Libraries used by multiple products |
Vendor | Mozilla |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU32328
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2016-1938
CWE-ID:
CWE-310 - Cryptographic Issues
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The s_mp_div function in lib/freebl/mpi/mpi.c in Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, improperly divides numbers, which might make it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging use of the (1) mp_div or (2) mp_exptmod function.
MitigationInstall update from vendor's website.
Vulnerable software versionsMozilla NSS: 3.13.4 - 3.52.1
CPE2.3https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
https://www.debian.org/security/2016/dsa-3688
https://www.mozilla.org/security/announce/2016/mfsa2016-07.html
https://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
https://www.securityfocus.com/bid/81955
https://www.securityfocus.com/bid/91787
https://www.securitytracker.com/id/1034825
https://www.ubuntu.com/usn/USN-2880-1
https://www.ubuntu.com/usn/USN-2880-2
https://www.ubuntu.com/usn/USN-2903-1
https://www.ubuntu.com/usn/USN-2903-2
https://www.ubuntu.com/usn/USN-2973-1
https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1190248
https://bugzilla.mozilla.org/show_bug.cgi?id=1194947
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes
https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c
https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c
https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
https://security.gentoo.org/glsa/201605-06
https://security.gentoo.org/glsa/201701-46
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.