Heap-based buffer overflow in Mozilla NSS - CVE-2017-11698
Published: August 15, 2017 / Updated: August 20, 2020
Vulnerability identifier: #VU7881
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-11698
CWE-ID: CWE-122
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: Mozilla
Affected software:
Mozilla NSS
Mozilla NSS
Detailed vulnerability description
The vulnerability allows a local attacker to gain elevated privileges.
The weakness exists due to heap-based buffer overflow in __get_page() in 'lib/dbm/src/h_page.c'. A local attacker supply a specially crafted 'cert8.db' file, cause is to be processed by the NSS 'certutil' application and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
The weakness exists due to heap-based buffer overflow in __get_page() in 'lib/dbm/src/h_page.c'. A local attacker supply a specially crafted 'cert8.db' file, cause is to be processed by the NSS 'certutil' application and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
How to mitigate CVE-2017-11698
Install update from vendor's website.