Risk | High |
Patch available | YES |
Number of vulnerabilities | 21 |
CVE-ID | CVE-2023-5388 CVE-2017-13797 CVE-2017-13803 CVE-2017-13802 CVE-2017-13798 CVE-2017-13796 CVE-2017-13795 CVE-2017-13794 CVE-2017-13793 CVE-2017-13792 CVE-2017-13791 CVE-2017-13788 CVE-2017-13785 CVE-2017-13784 CVE-2017-13783 CVE-2017-7113 CVE-2017-13804 CVE-2017-13805 CVE-2017-13844 CVE-2017-13799 CVE-2017-13849 |
CWE-ID | CWE-385 CWE-416 CWE-119 CWE-264 CWE-20 CWE-284 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #2 is available. Public exploit code for vulnerability #4 is available. Public exploit code for vulnerability #5 is available. Public exploit code for vulnerability #6 is available. Public exploit code for vulnerability #7 is available. Public exploit code for vulnerability #8 is available. Public exploit code for vulnerability #10 is available. Public exploit code for vulnerability #11 is available. Public exploit code for vulnerability #13 is available. Public exploit code for vulnerability #14 is available. Public exploit code for vulnerability #15 is available. Public exploit code for vulnerability #21 is available. |
Vulnerable software |
SUSE Linux Enterprise Micro for Rancher Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 SP3 LTSS Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 SP2 LTSS Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing LTSS 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS Operating systems & Components / Operating system SUSE Enterprise Storage Operating systems & Components / Operating system SUSE Linux Enterprise Micro Operating systems & Components / Operating system mozilla-nss-sysinit-32bit-debuginfo Operating systems & Components / Operating system package or component mozilla-nss-sysinit-32bit Operating systems & Components / Operating system package or component mozilla-nss-certs-32bit-debuginfo Operating systems & Components / Operating system package or component libsoftokn3-32bit-debuginfo Operating systems & Components / Operating system package or component libfreebl3-32bit Operating systems & Components / Operating system package or component mozilla-nss-32bit-debuginfo Operating systems & Components / Operating system package or component libfreebl3-32bit-debuginfo Operating systems & Components / Operating system package or component mozilla-nss-32bit Operating systems & Components / Operating system package or component libsoftokn3-32bit Operating systems & Components / Operating system package or component mozilla-nss-certs-32bit Operating systems & Components / Operating system package or component mozilla-nss-debuginfo Operating systems & Components / Operating system package or component libsoftokn3-debuginfo Operating systems & Components / Operating system package or component mozilla-nss Operating systems & Components / Operating system package or component mozilla-nss-sysinit-debuginfo Operating systems & Components / Operating system package or component mozilla-nss-sysinit Operating systems & Components / Operating system package or component mozilla-nss-tools-debuginfo Operating systems & Components / Operating system package or component libfreebl3-debuginfo Operating systems & Components / Operating system package or component mozilla-nss-certs-debuginfo Operating systems & Components / Operating system package or component mozilla-nss-tools Operating systems & Components / Operating system package or component mozilla-nss-devel Operating systems & Components / Operating system package or component mozilla-nss-debugsource Operating systems & Components / Operating system package or component mozilla-nss-certs Operating systems & Components / Operating system package or component libsoftokn3 Operating systems & Components / Operating system package or component libfreebl3 Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 21 vulnerabilities.
EUVDB-ID: #VU85267
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-5388
CWE-ID:
CWE-385 - Covert Timing Channel
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to insufficient fix for #VU84108 (CVE-2023-4421). A remote attacker can perform Marvin attack and gain access to sensitive information.
Update the affected package mozilla-nss to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro for Rancher: 5.2
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP3
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Enterprise Storage: 7.1
SUSE Linux Enterprise Micro: 5.1 - 5.2
mozilla-nss-sysinit-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-32bit: before 3.101.1-150000.3.117.1
libsoftokn3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit: before 3.101.1-150000.3.117.1
mozilla-nss-tools-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-certs-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-tools: before 3.101.1-150000.3.117.1
mozilla-nss-devel: before 3.101.1-150000.3.117.1
mozilla-nss-debugsource: before 3.101.1-150000.3.117.1
mozilla-nss-certs: before 3.101.1-150000.3.117.1
libsoftokn3: before 3.101.1-150000.3.117.1
libfreebl3: before 3.101.1-150000.3.117.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242600-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9749
Risk: High
CVSSv4.0: 7.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID: CVE-2017-13797
CWE-ID:
CWE-416 - Use After Free
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to use-after-free error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Update the affected package mozilla-nss to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro for Rancher: 5.2
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP3
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Enterprise Storage: 7.1
SUSE Linux Enterprise Micro: 5.1 - 5.2
mozilla-nss-sysinit-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-32bit: before 3.101.1-150000.3.117.1
libsoftokn3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit: before 3.101.1-150000.3.117.1
mozilla-nss-tools-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-certs-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-tools: before 3.101.1-150000.3.117.1
mozilla-nss-devel: before 3.101.1-150000.3.117.1
mozilla-nss-debugsource: before 3.101.1-150000.3.117.1
mozilla-nss-certs: before 3.101.1-150000.3.117.1
libsoftokn3: before 3.101.1-150000.3.117.1
libfreebl3: before 3.101.1-150000.3.117.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242600-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU9038
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2017-13803
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Update the affected package mozilla-nss to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro for Rancher: 5.2
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP3
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Enterprise Storage: 7.1
SUSE Linux Enterprise Micro: 5.1 - 5.2
mozilla-nss-sysinit-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-32bit: before 3.101.1-150000.3.117.1
libsoftokn3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit: before 3.101.1-150000.3.117.1
mozilla-nss-tools-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-certs-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-tools: before 3.101.1-150000.3.117.1
mozilla-nss-devel: before 3.101.1-150000.3.117.1
mozilla-nss-debugsource: before 3.101.1-150000.3.117.1
mozilla-nss-certs: before 3.101.1-150000.3.117.1
libsoftokn3: before 3.101.1-150000.3.117.1
libfreebl3: before 3.101.1-150000.3.117.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242600-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9037
Risk: High
CVSSv4.0: 7.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID: CVE-2017-13802
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Update the affected package mozilla-nss to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro for Rancher: 5.2
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP3
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Enterprise Storage: 7.1
SUSE Linux Enterprise Micro: 5.1 - 5.2
mozilla-nss-sysinit-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-32bit: before 3.101.1-150000.3.117.1
libsoftokn3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit: before 3.101.1-150000.3.117.1
mozilla-nss-tools-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-certs-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-tools: before 3.101.1-150000.3.117.1
mozilla-nss-devel: before 3.101.1-150000.3.117.1
mozilla-nss-debugsource: before 3.101.1-150000.3.117.1
mozilla-nss-certs: before 3.101.1-150000.3.117.1
libsoftokn3: before 3.101.1-150000.3.117.1
libfreebl3: before 3.101.1-150000.3.117.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242600-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU9036
Risk: High
CVSSv4.0: 7.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID: CVE-2017-13798
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Update the affected package mozilla-nss to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro for Rancher: 5.2
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP3
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Enterprise Storage: 7.1
SUSE Linux Enterprise Micro: 5.1 - 5.2
mozilla-nss-sysinit-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-32bit: before 3.101.1-150000.3.117.1
libsoftokn3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit: before 3.101.1-150000.3.117.1
mozilla-nss-tools-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-certs-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-tools: before 3.101.1-150000.3.117.1
mozilla-nss-devel: before 3.101.1-150000.3.117.1
mozilla-nss-debugsource: before 3.101.1-150000.3.117.1
mozilla-nss-certs: before 3.101.1-150000.3.117.1
libsoftokn3: before 3.101.1-150000.3.117.1
libfreebl3: before 3.101.1-150000.3.117.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242600-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU9035
Risk: High
CVSSv4.0: 7.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID: CVE-2017-13796
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Update the affected package mozilla-nss to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro for Rancher: 5.2
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP3
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Enterprise Storage: 7.1
SUSE Linux Enterprise Micro: 5.1 - 5.2
mozilla-nss-sysinit-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-32bit: before 3.101.1-150000.3.117.1
libsoftokn3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit: before 3.101.1-150000.3.117.1
mozilla-nss-tools-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-certs-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-tools: before 3.101.1-150000.3.117.1
mozilla-nss-devel: before 3.101.1-150000.3.117.1
mozilla-nss-debugsource: before 3.101.1-150000.3.117.1
mozilla-nss-certs: before 3.101.1-150000.3.117.1
libsoftokn3: before 3.101.1-150000.3.117.1
libfreebl3: before 3.101.1-150000.3.117.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242600-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU9034
Risk: High
CVSSv4.0: 7.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID: CVE-2017-13795
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Update the affected package mozilla-nss to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro for Rancher: 5.2
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP3
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Enterprise Storage: 7.1
SUSE Linux Enterprise Micro: 5.1 - 5.2
mozilla-nss-sysinit-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-32bit: before 3.101.1-150000.3.117.1
libsoftokn3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit: before 3.101.1-150000.3.117.1
mozilla-nss-tools-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-certs-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-tools: before 3.101.1-150000.3.117.1
mozilla-nss-devel: before 3.101.1-150000.3.117.1
mozilla-nss-debugsource: before 3.101.1-150000.3.117.1
mozilla-nss-certs: before 3.101.1-150000.3.117.1
libsoftokn3: before 3.101.1-150000.3.117.1
libfreebl3: before 3.101.1-150000.3.117.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242600-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU9033
Risk: High
CVSSv4.0: 7.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID: CVE-2017-13794
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Update the affected package mozilla-nss to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro for Rancher: 5.2
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP3
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Enterprise Storage: 7.1
SUSE Linux Enterprise Micro: 5.1 - 5.2
mozilla-nss-sysinit-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-32bit: before 3.101.1-150000.3.117.1
libsoftokn3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit: before 3.101.1-150000.3.117.1
mozilla-nss-tools-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-certs-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-tools: before 3.101.1-150000.3.117.1
mozilla-nss-devel: before 3.101.1-150000.3.117.1
mozilla-nss-debugsource: before 3.101.1-150000.3.117.1
mozilla-nss-certs: before 3.101.1-150000.3.117.1
libsoftokn3: before 3.101.1-150000.3.117.1
libfreebl3: before 3.101.1-150000.3.117.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242600-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU9032
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2017-13793
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Update the affected package mozilla-nss to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro for Rancher: 5.2
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP3
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Enterprise Storage: 7.1
SUSE Linux Enterprise Micro: 5.1 - 5.2
mozilla-nss-sysinit-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-32bit: before 3.101.1-150000.3.117.1
libsoftokn3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit: before 3.101.1-150000.3.117.1
mozilla-nss-tools-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-certs-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-tools: before 3.101.1-150000.3.117.1
mozilla-nss-devel: before 3.101.1-150000.3.117.1
mozilla-nss-debugsource: before 3.101.1-150000.3.117.1
mozilla-nss-certs: before 3.101.1-150000.3.117.1
libsoftokn3: before 3.101.1-150000.3.117.1
libfreebl3: before 3.101.1-150000.3.117.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242600-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9031
Risk: High
CVSSv4.0: 7.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID: CVE-2017-13792
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Update the affected package mozilla-nss to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro for Rancher: 5.2
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP3
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Enterprise Storage: 7.1
SUSE Linux Enterprise Micro: 5.1 - 5.2
mozilla-nss-sysinit-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-32bit: before 3.101.1-150000.3.117.1
libsoftokn3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit: before 3.101.1-150000.3.117.1
mozilla-nss-tools-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-certs-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-tools: before 3.101.1-150000.3.117.1
mozilla-nss-devel: before 3.101.1-150000.3.117.1
mozilla-nss-debugsource: before 3.101.1-150000.3.117.1
mozilla-nss-certs: before 3.101.1-150000.3.117.1
libsoftokn3: before 3.101.1-150000.3.117.1
libfreebl3: before 3.101.1-150000.3.117.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242600-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU9030
Risk: High
CVSSv4.0: 7.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID: CVE-2017-13791
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Update the affected package mozilla-nss to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro for Rancher: 5.2
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP3
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Enterprise Storage: 7.1
SUSE Linux Enterprise Micro: 5.1 - 5.2
mozilla-nss-sysinit-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-32bit: before 3.101.1-150000.3.117.1
libsoftokn3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit: before 3.101.1-150000.3.117.1
mozilla-nss-tools-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-certs-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-tools: before 3.101.1-150000.3.117.1
mozilla-nss-devel: before 3.101.1-150000.3.117.1
mozilla-nss-debugsource: before 3.101.1-150000.3.117.1
mozilla-nss-certs: before 3.101.1-150000.3.117.1
libsoftokn3: before 3.101.1-150000.3.117.1
libfreebl3: before 3.101.1-150000.3.117.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242600-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU9029
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2017-13788
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Update the affected package mozilla-nss to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro for Rancher: 5.2
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP3
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Enterprise Storage: 7.1
SUSE Linux Enterprise Micro: 5.1 - 5.2
mozilla-nss-sysinit-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-32bit: before 3.101.1-150000.3.117.1
libsoftokn3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit: before 3.101.1-150000.3.117.1
mozilla-nss-tools-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-certs-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-tools: before 3.101.1-150000.3.117.1
mozilla-nss-devel: before 3.101.1-150000.3.117.1
mozilla-nss-debugsource: before 3.101.1-150000.3.117.1
mozilla-nss-certs: before 3.101.1-150000.3.117.1
libsoftokn3: before 3.101.1-150000.3.117.1
libfreebl3: before 3.101.1-150000.3.117.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242600-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9028
Risk: High
CVSSv4.0: 7.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID: CVE-2017-13785
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Update the affected package mozilla-nss to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro for Rancher: 5.2
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP3
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Enterprise Storage: 7.1
SUSE Linux Enterprise Micro: 5.1 - 5.2
mozilla-nss-sysinit-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-32bit: before 3.101.1-150000.3.117.1
libsoftokn3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit: before 3.101.1-150000.3.117.1
mozilla-nss-tools-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-certs-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-tools: before 3.101.1-150000.3.117.1
mozilla-nss-devel: before 3.101.1-150000.3.117.1
mozilla-nss-debugsource: before 3.101.1-150000.3.117.1
mozilla-nss-certs: before 3.101.1-150000.3.117.1
libsoftokn3: before 3.101.1-150000.3.117.1
libfreebl3: before 3.101.1-150000.3.117.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242600-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU9027
Risk: High
CVSSv4.0: 7.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID: CVE-2017-13784
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Update the affected package mozilla-nss to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro for Rancher: 5.2
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP3
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Enterprise Storage: 7.1
SUSE Linux Enterprise Micro: 5.1 - 5.2
mozilla-nss-sysinit-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-32bit: before 3.101.1-150000.3.117.1
libsoftokn3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit: before 3.101.1-150000.3.117.1
mozilla-nss-tools-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-certs-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-tools: before 3.101.1-150000.3.117.1
mozilla-nss-devel: before 3.101.1-150000.3.117.1
mozilla-nss-debugsource: before 3.101.1-150000.3.117.1
mozilla-nss-certs: before 3.101.1-150000.3.117.1
libsoftokn3: before 3.101.1-150000.3.117.1
libfreebl3: before 3.101.1-150000.3.117.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242600-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU9026
Risk: High
CVSSv4.0: 7.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID: CVE-2017-13783
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Update the affected package mozilla-nss to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro for Rancher: 5.2
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP3
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Enterprise Storage: 7.1
SUSE Linux Enterprise Micro: 5.1 - 5.2
mozilla-nss-sysinit-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-32bit: before 3.101.1-150000.3.117.1
libsoftokn3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit: before 3.101.1-150000.3.117.1
mozilla-nss-tools-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-certs-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-tools: before 3.101.1-150000.3.117.1
mozilla-nss-devel: before 3.101.1-150000.3.117.1
mozilla-nss-debugsource: before 3.101.1-150000.3.117.1
mozilla-nss-certs: before 3.101.1-150000.3.117.1
libsoftokn3: before 3.101.1-150000.3.117.1
libfreebl3: before 3.101.1-150000.3.117.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242600-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU9025
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2017-7113
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to obtain potentially sensitive information on the target system.
The weakness exists due to a flaw in the UIKit component. A local attacker can view characters in a secure text field during focus change events.
Update the affected package mozilla-nss to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro for Rancher: 5.2
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP3
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Enterprise Storage: 7.1
SUSE Linux Enterprise Micro: 5.1 - 5.2
mozilla-nss-sysinit-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-32bit: before 3.101.1-150000.3.117.1
libsoftokn3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit: before 3.101.1-150000.3.117.1
mozilla-nss-tools-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-certs-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-tools: before 3.101.1-150000.3.117.1
mozilla-nss-devel: before 3.101.1-150000.3.117.1
mozilla-nss-debugsource: before 3.101.1-150000.3.117.1
mozilla-nss-certs: before 3.101.1-150000.3.117.1
libsoftokn3: before 3.101.1-150000.3.117.1
libfreebl3: before 3.101.1-150000.3.117.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242600-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9024
Risk: High
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2017-13804
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to improper input validation. A remote attacker can trick the victim into opening a specially crafted zip file, trigger a path handling flaw in the StreamingZip component and modify restricted areas of the file system.
Update the affected package mozilla-nss to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro for Rancher: 5.2
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP3
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Enterprise Storage: 7.1
SUSE Linux Enterprise Micro: 5.1 - 5.2
mozilla-nss-sysinit-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-32bit: before 3.101.1-150000.3.117.1
libsoftokn3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit: before 3.101.1-150000.3.117.1
mozilla-nss-tools-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-certs-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-tools: before 3.101.1-150000.3.117.1
mozilla-nss-devel: before 3.101.1-150000.3.117.1
mozilla-nss-debugsource: before 3.101.1-150000.3.117.1
mozilla-nss-certs: before 3.101.1-150000.3.117.1
libsoftokn3: before 3.101.1-150000.3.117.1
libfreebl3: before 3.101.1-150000.3.117.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242600-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9023
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2017-13805
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to obtain potentially sensitive information on the target system.
The weakness exists due to a flaw in the Siri component. A local attacker can use Siri to read notifications of content that is set not to be displayed at the lock screen.
Update the affected package mozilla-nss to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro for Rancher: 5.2
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP3
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Enterprise Storage: 7.1
SUSE Linux Enterprise Micro: 5.1 - 5.2
mozilla-nss-sysinit-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-32bit: before 3.101.1-150000.3.117.1
libsoftokn3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit: before 3.101.1-150000.3.117.1
mozilla-nss-tools-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-certs-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-tools: before 3.101.1-150000.3.117.1
mozilla-nss-devel: before 3.101.1-150000.3.117.1
mozilla-nss-debugsource: before 3.101.1-150000.3.117.1
mozilla-nss-certs: before 3.101.1-150000.3.117.1
libsoftokn3: before 3.101.1-150000.3.117.1
libfreebl3: before 3.101.1-150000.3.117.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242600-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9022
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2017-13844
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to obtain potentially sensitive information on the target system.
The weakness exists due to a flaw in the Messages application. A local attacker can supply Reply With Message and access photos from the lock screen.
Update the affected package mozilla-nss to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro for Rancher: 5.2
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP3
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Enterprise Storage: 7.1
SUSE Linux Enterprise Micro: 5.1 - 5.2
mozilla-nss-sysinit-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-32bit: before 3.101.1-150000.3.117.1
libsoftokn3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit: before 3.101.1-150000.3.117.1
mozilla-nss-tools-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-certs-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-tools: before 3.101.1-150000.3.117.1
mozilla-nss-devel: before 3.101.1-150000.3.117.1
mozilla-nss-debugsource: before 3.101.1-150000.3.117.1
mozilla-nss-certs: before 3.101.1-150000.3.117.1
libsoftokn3: before 3.101.1-150000.3.117.1
libfreebl3: before 3.101.1-150000.3.117.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242600-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9021
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2017-13799
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to memory handling error in the kernel component. A remote attacker can trigger memory corruption and execute arbitrary code with kernel privileges.
Update the affected package mozilla-nss to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro for Rancher: 5.2
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP3
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Enterprise Storage: 7.1
SUSE Linux Enterprise Micro: 5.1 - 5.2
mozilla-nss-sysinit-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-32bit: before 3.101.1-150000.3.117.1
libsoftokn3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit: before 3.101.1-150000.3.117.1
mozilla-nss-tools-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-certs-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-tools: before 3.101.1-150000.3.117.1
mozilla-nss-devel: before 3.101.1-150000.3.117.1
mozilla-nss-debugsource: before 3.101.1-150000.3.117.1
mozilla-nss-certs: before 3.101.1-150000.3.117.1
libsoftokn3: before 3.101.1-150000.3.117.1
libfreebl3: before 3.101.1-150000.3.117.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242600-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9020
Risk: Low
CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2017-13849
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to memory handling error in the CoreText component. A remote attacker can supply a specially crafted text file, trigger memory corruption and cause an unexpected application termination.
Update the affected package mozilla-nss to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro for Rancher: 5.2
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15: SP2 - SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP3
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Enterprise Storage: 7.1
SUSE Linux Enterprise Micro: 5.1 - 5.2
mozilla-nss-sysinit-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-32bit-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-32bit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-32bit: before 3.101.1-150000.3.117.1
libsoftokn3-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-certs-32bit: before 3.101.1-150000.3.117.1
mozilla-nss-debuginfo: before 3.101.1-150000.3.117.1
libsoftokn3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-sysinit: before 3.101.1-150000.3.117.1
mozilla-nss-tools-debuginfo: before 3.101.1-150000.3.117.1
libfreebl3-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-certs-debuginfo: before 3.101.1-150000.3.117.1
mozilla-nss-tools: before 3.101.1-150000.3.117.1
mozilla-nss-devel: before 3.101.1-150000.3.117.1
mozilla-nss-debugsource: before 3.101.1-150000.3.117.1
mozilla-nss-certs: before 3.101.1-150000.3.117.1
libsoftokn3: before 3.101.1-150000.3.117.1
libfreebl3: before 3.101.1-150000.3.117.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242600-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.