ID

VAR-202010-1059


CVE

CVE-2018-18508


TITLE

Network Security Services  In  NULL  Pointer dereference vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-016512

DESCRIPTION

In Network Security Services (NSS) before 3.36.7 and before 3.41.1, a malformed signature can cause a crash due to a null dereference, resulting in a Denial of Service. Attackers can exploit this issue to crash the application, resulting in a denial-of-service condition. Mozilla Network Security Services versions prior to 3.41.1 are vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: nss and nspr security, bug fix, and enhancement update Advisory ID: RHSA-2019:1951-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:1951 Issue date: 2019-07-30 CVE Names: CVE-2018-18508 CVE-2019-11719 CVE-2019-11727 CVE-2019-11729 ==================================================================== 1. Summary: An update for nss and nspr is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64 3. Description: Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The following packages have been upgraded to a later upstream version: nss (3.44.0), nspr (4.21.0). (BZ#1713187, BZ#1713188) Security Fix(es): * nss: NULL pointer dereference in several CMS functions resulting in a denial of service (CVE-2018-18508) * nss: Out-of-bounds read when importing curve25519 private key (CVE-2019-11719) * nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (CVE-2019-11729) * nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 (CVE-2019-11727) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * PQG verify fails when create DSA PQG parameters because the counts aren't returned correctly. (BZ#1685325) * zeroization of AES context missing (BZ#1719629) * RSA Pairwise consistency test (BZ#1719630) * FIPS updated for nss-softoken POST (BZ#1722373) * DH/ECDH key tests missing for the PG parameters (BZ#1722374) * NSS should implement continuous random test on it's seed data or use the kernel AF_ALG interface for random (BZ#1725059) * support setting supported signature algorithms in strsclnt utility (BZ#1725110) * certutil -F with no parameters is killed with segmentation fault message (BZ#1725115) * NSS: Support for IKE/IPsec typical PKIX usage so libreswan can use nss without rejecting certs based on EKU (BZ#1725116) * NSS should use getentropy() for seeding its RNG, not /dev/urandom. Needs update to NSS 3.37 (BZ#1725117) * Disable TLS 1.3 in FIPS mode (BZ#1725773) * Wrong alert sent when client uses PKCS#1 signatures in TLS 1.3 (BZ#1728259) * x25519 allowed in FIPS mode (BZ#1728260) * post handshake authentication with selfserv does not work if SSL_ENABLE_SESSION_TICKETS is set (BZ#1728261) Enhancement(s): * Move IKEv1 and IKEv2 KDF's from libreswan to nss-softkn (BZ#1719628) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, applications using NSS or NSPR (for example, Firefox) must be restarted for this update to take effect. 5. 1719629 - zeroization of AES context missing [rhel-8.0.0.z] 1719630 - RSA Pairwise consistency test [rhel-8.0.0.z] 1722373 - FIPS updated for nss-softoken POST [rhel-8.0.0.z] 1722374 - DH/ECDH key tests missing for the PG parameters [rhel-8.0.0.z] 1725059 - NSS should implement continuous random test on it's seed data or use the kernel AF_ALG interface for random [rhel-8.0.0.z] 1725110 - support setting supported signature algorithms in strsclnt utility [rhel-8.0.0.z] 1725115 - certutil -F with no parameters is killed with segmentation fault message [rhel-8.0.0.z] 1725116 - NSS: Support for IKE/IPsec typical PKIX usage so libreswan can use nss without rejecting certs based on EKU [rhel-8.0.0.z] 1728259 - Wrong alert sent when client uses PKCS#1 signatures in TLS 1.3 [rhel-8.0.0.z] 1728260 - x25519 allowed in FIPS mode [rhel-8.0.0.z] 1728261 - post handshake authentication with selfserv does not work if SSL_ENABLE_SESSION_TICKETS is set [rhel-8.0.0.z] 1728436 - CVE-2019-11719 nss: Out-of-bounds read when importing curve25519 private key 1728437 - CVE-2019-11729 nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault 1730988 - CVE-2019-11727 nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 6. Package List: Red Hat Enterprise Linux AppStream (v. 8): Source: nspr-4.21.0-2.el8_0.src.rpm nss-3.44.0-7.el8_0.src.rpm aarch64: nspr-4.21.0-2.el8_0.aarch64.rpm nspr-debuginfo-4.21.0-2.el8_0.aarch64.rpm nspr-debugsource-4.21.0-2.el8_0.aarch64.rpm nspr-devel-4.21.0-2.el8_0.aarch64.rpm nss-3.44.0-7.el8_0.aarch64.rpm nss-debuginfo-3.44.0-7.el8_0.aarch64.rpm nss-debugsource-3.44.0-7.el8_0.aarch64.rpm nss-devel-3.44.0-7.el8_0.aarch64.rpm nss-softokn-3.44.0-7.el8_0.aarch64.rpm nss-softokn-debuginfo-3.44.0-7.el8_0.aarch64.rpm nss-softokn-devel-3.44.0-7.el8_0.aarch64.rpm nss-softokn-freebl-3.44.0-7.el8_0.aarch64.rpm nss-softokn-freebl-debuginfo-3.44.0-7.el8_0.aarch64.rpm nss-softokn-freebl-devel-3.44.0-7.el8_0.aarch64.rpm nss-sysinit-3.44.0-7.el8_0.aarch64.rpm nss-sysinit-debuginfo-3.44.0-7.el8_0.aarch64.rpm nss-tools-3.44.0-7.el8_0.aarch64.rpm nss-tools-debuginfo-3.44.0-7.el8_0.aarch64.rpm nss-util-3.44.0-7.el8_0.aarch64.rpm nss-util-debuginfo-3.44.0-7.el8_0.aarch64.rpm nss-util-devel-3.44.0-7.el8_0.aarch64.rpm ppc64le: nspr-4.21.0-2.el8_0.ppc64le.rpm nspr-debuginfo-4.21.0-2.el8_0.ppc64le.rpm nspr-debugsource-4.21.0-2.el8_0.ppc64le.rpm nspr-devel-4.21.0-2.el8_0.ppc64le.rpm nss-3.44.0-7.el8_0.ppc64le.rpm nss-debuginfo-3.44.0-7.el8_0.ppc64le.rpm nss-debugsource-3.44.0-7.el8_0.ppc64le.rpm nss-devel-3.44.0-7.el8_0.ppc64le.rpm nss-softokn-3.44.0-7.el8_0.ppc64le.rpm nss-softokn-debuginfo-3.44.0-7.el8_0.ppc64le.rpm nss-softokn-devel-3.44.0-7.el8_0.ppc64le.rpm nss-softokn-freebl-3.44.0-7.el8_0.ppc64le.rpm nss-softokn-freebl-debuginfo-3.44.0-7.el8_0.ppc64le.rpm nss-softokn-freebl-devel-3.44.0-7.el8_0.ppc64le.rpm nss-sysinit-3.44.0-7.el8_0.ppc64le.rpm nss-sysinit-debuginfo-3.44.0-7.el8_0.ppc64le.rpm nss-tools-3.44.0-7.el8_0.ppc64le.rpm nss-tools-debuginfo-3.44.0-7.el8_0.ppc64le.rpm nss-util-3.44.0-7.el8_0.ppc64le.rpm nss-util-debuginfo-3.44.0-7.el8_0.ppc64le.rpm nss-util-devel-3.44.0-7.el8_0.ppc64le.rpm s390x: nspr-4.21.0-2.el8_0.s390x.rpm nspr-debuginfo-4.21.0-2.el8_0.s390x.rpm nspr-debugsource-4.21.0-2.el8_0.s390x.rpm nspr-devel-4.21.0-2.el8_0.s390x.rpm nss-3.44.0-7.el8_0.s390x.rpm nss-debuginfo-3.44.0-7.el8_0.s390x.rpm nss-debugsource-3.44.0-7.el8_0.s390x.rpm nss-devel-3.44.0-7.el8_0.s390x.rpm nss-softokn-3.44.0-7.el8_0.s390x.rpm nss-softokn-debuginfo-3.44.0-7.el8_0.s390x.rpm nss-softokn-devel-3.44.0-7.el8_0.s390x.rpm nss-softokn-freebl-3.44.0-7.el8_0.s390x.rpm nss-softokn-freebl-debuginfo-3.44.0-7.el8_0.s390x.rpm nss-softokn-freebl-devel-3.44.0-7.el8_0.s390x.rpm nss-sysinit-3.44.0-7.el8_0.s390x.rpm nss-sysinit-debuginfo-3.44.0-7.el8_0.s390x.rpm nss-tools-3.44.0-7.el8_0.s390x.rpm nss-tools-debuginfo-3.44.0-7.el8_0.s390x.rpm nss-util-3.44.0-7.el8_0.s390x.rpm nss-util-debuginfo-3.44.0-7.el8_0.s390x.rpm nss-util-devel-3.44.0-7.el8_0.s390x.rpm x86_64: nspr-4.21.0-2.el8_0.i686.rpm nspr-4.21.0-2.el8_0.x86_64.rpm nspr-debuginfo-4.21.0-2.el8_0.i686.rpm nspr-debuginfo-4.21.0-2.el8_0.x86_64.rpm nspr-debugsource-4.21.0-2.el8_0.i686.rpm nspr-debugsource-4.21.0-2.el8_0.x86_64.rpm nspr-devel-4.21.0-2.el8_0.i686.rpm nspr-devel-4.21.0-2.el8_0.x86_64.rpm nss-3.44.0-7.el8_0.i686.rpm nss-3.44.0-7.el8_0.x86_64.rpm nss-debuginfo-3.44.0-7.el8_0.i686.rpm nss-debuginfo-3.44.0-7.el8_0.x86_64.rpm nss-debugsource-3.44.0-7.el8_0.i686.rpm nss-debugsource-3.44.0-7.el8_0.x86_64.rpm nss-devel-3.44.0-7.el8_0.i686.rpm nss-devel-3.44.0-7.el8_0.x86_64.rpm nss-softokn-3.44.0-7.el8_0.i686.rpm nss-softokn-3.44.0-7.el8_0.x86_64.rpm nss-softokn-debuginfo-3.44.0-7.el8_0.i686.rpm nss-softokn-debuginfo-3.44.0-7.el8_0.x86_64.rpm nss-softokn-devel-3.44.0-7.el8_0.i686.rpm nss-softokn-devel-3.44.0-7.el8_0.x86_64.rpm nss-softokn-freebl-3.44.0-7.el8_0.i686.rpm nss-softokn-freebl-3.44.0-7.el8_0.x86_64.rpm nss-softokn-freebl-debuginfo-3.44.0-7.el8_0.i686.rpm nss-softokn-freebl-debuginfo-3.44.0-7.el8_0.x86_64.rpm nss-softokn-freebl-devel-3.44.0-7.el8_0.i686.rpm nss-softokn-freebl-devel-3.44.0-7.el8_0.x86_64.rpm nss-sysinit-3.44.0-7.el8_0.x86_64.rpm nss-sysinit-debuginfo-3.44.0-7.el8_0.i686.rpm nss-sysinit-debuginfo-3.44.0-7.el8_0.x86_64.rpm nss-tools-3.44.0-7.el8_0.x86_64.rpm nss-tools-debuginfo-3.44.0-7.el8_0.i686.rpm nss-tools-debuginfo-3.44.0-7.el8_0.x86_64.rpm nss-util-3.44.0-7.el8_0.i686.rpm nss-util-3.44.0-7.el8_0.x86_64.rpm nss-util-debuginfo-3.44.0-7.el8_0.i686.rpm nss-util-debuginfo-3.44.0-7.el8_0.x86_64.rpm nss-util-devel-3.44.0-7.el8_0.i686.rpm nss-util-devel-3.44.0-7.el8_0.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-18508 https://access.redhat.com/security/cve/CVE-2019-11719 https://access.redhat.com/security/cve/CVE-2019-11727 https://access.redhat.com/security/cve/CVE-2019-11729 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXUCfq9zjgjWX9erEAQjjQA/9HhUp+Cnfdn35f1x4Kj0gKkph2oaC9cEd QQu1wSlb6s/PjWx0dQUv0rAv4g/rhKfg2o0E1JgfkSPXeqtXVNKgGjC61VAXepnN kFRxD+Tbcf7+0XFuTk0wtKEaHs6Y6sBVpfV2V6EjHJJslRGCXSe9gh6Q/LXLzeOw Gk5g+6RuKlQ7K2xSeVE/V6jItXAXx6DRpFMPpUMQne1c4rCIsh1iW5n20Si2ftu9 dHDw8C0vNUm7Mdos+lZ+NbnagnEFiwmEcFsDXKFFE/TkU54io4rXJjslNNtUFUc4 1e4I8OVsrVvhLKRxcYSBpVT3HjUYwrwAMnK5oEDdvOnJMgq1ndq47ZcGsRpC4vC2 1+fahlwiEXHZmL/9/1Dx4ldsRVqVpjkMQu9YwPmHpGIukru4ZatZPmTnRO2tZ90C p26RCE31I+7tKLY7I0xSZWjYo7NpIRhwa54zeK3zGkvOfKUgXdcmmkCXhve1KHse FMSPXrTbfaKSYzTVwQLKYeOmMK1/kC6wKpcXVRl/InkCh1I1mgbJoX/XXLLjmiD9 HgxRo3YVpl/Yi8V9Gv432lXTpgYDorJwUV6tt29cRwldSKAv53JDk+gt6B9ELyKW 5HbVUbK3zi264QBEmTKHOH58j9Q+4juW/O8pnKVbI4a3w+sMxP0Sllmka98UPK3M soGsMntiCX0=fQiK -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202003-37 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Mozilla Network Security Service: Multiple vulnerabilities Date: March 16, 2020 Bugs: #627534, #676868, #701840 ID: 202003-37 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Mozilla Network Security Service (NSS), the worst of which may lead to arbitrary code execution. Background ========== The Mozilla Network Security Service (NSS) is a library implementing security features like SSL v.2/v.3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME and X.509 certificates. Please review the CVE identifiers referenced below for details. Impact ====== An attacker could execute arbitrary code, cause a Denial of Service condition or have other unspecified impact. Workaround ========== There is no known workaround at this time. Resolution ========== All Mozilla Network Security Service (NSS) users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/nss-3.49" References ========== [ 1 ] CVE-2017-11695 https://nvd.nist.gov/vuln/detail/CVE-2017-11695 [ 2 ] CVE-2017-11696 https://nvd.nist.gov/vuln/detail/CVE-2017-11696 [ 3 ] CVE-2017-11697 https://nvd.nist.gov/vuln/detail/CVE-2017-11697 [ 4 ] CVE-2017-11698 https://nvd.nist.gov/vuln/detail/CVE-2017-11698 [ 5 ] CVE-2018-18508 https://nvd.nist.gov/vuln/detail/CVE-2018-18508 [ 6 ] CVE-2019-11745 https://nvd.nist.gov/vuln/detail/CVE-2019-11745 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202003-37 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2020 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . ========================================================================== Ubuntu Security Notice USN-3898-2 February 27, 2019 nss vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 ESM Summary: NSS could be made to crash if it received specially crafted network traffic. This update provides the corresponding update for Ubuntu 12.04 ESM. Original advisory details: Hanno BAPck and Damian Poddebniak discovered that NSS incorrectly handled certain CMS functions

Trust: 2.34

sources: NVD: CVE-2018-18508 // JVNDB: JVNDB-2018-016512 // BID: 107257 // VULMON: CVE-2018-18508 // PACKETSTORM: 153834 // PACKETSTORM: 156770 // PACKETSTORM: 151881 // PACKETSTORM: 151880

AFFECTED PRODUCTS

vendor:siemensmodel:ruggedcom rox mx5000scope:ltversion:2.14.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1500scope:ltversion:2.14.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1501scope:ltversion:2.14.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx5000scope:ltversion:2.14.0

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1400scope:ltversion:2.14.0

Trust: 1.0

vendor:mozillamodel:network security servicesscope:gteversion:3.41

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1510scope:ltversion:2.14.0

Trust: 1.0

vendor:mozillamodel:network security servicesscope:ltversion:3.41.1

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1511scope:ltversion:2.14.0

Trust: 1.0

vendor:mozillamodel:network security servicesscope:ltversion:3.36.7

Trust: 1.0

vendor:siemensmodel:ruggedcom rox rx1512scope:ltversion:2.14.0

Trust: 1.0

vendor:mozillamodel:network security servicesscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox mx5000scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1400scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1500scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1501scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1510scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1511scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx1512scope: - version: -

Trust: 0.8

vendor:シーメンスmodel:ruggedcom rox rx5000scope: - version: -

Trust: 0.8

vendor:ubuntumodel:linuxscope:eqversion:18.10

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:18.04

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:16.04

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.3

vendor:ubuntumodel:linux esmscope:eqversion:12.04

Trust: 0.3

vendor:redhatmodel:virtualizationscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.40.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.37.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.36.5

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.28.4

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.28

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.21.4

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.21.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.20.2

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.20.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.19.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.17.3

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.17.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.15.4

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.15.3

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.15.2

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.15.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.14.5

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.14.4

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.12.10

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.12.8

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.12.5

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.12.4

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.12.3

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.12.2

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.12.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.11.3

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.9.2

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.9

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.8

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.7.7

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.7.5

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.7.3

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.7.2

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.7.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.7

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.6.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.6

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.5

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.4.2

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.4.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.4

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.3.2

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.3.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.3

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.2.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.2

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.41

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.40

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.39

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.38

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.37

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.36

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.24.0

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.23

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.21

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.20

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.19.2.3

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.17

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.16.5

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.16.2.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.16

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.15.5

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.15.3.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.15

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.14.3

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.14.2

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.14.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.14

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.13.4

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.13.3

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.12.9

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.12.7

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.12.6

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.12.3.2

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.12.3.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.12.11

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.12

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.11

Trust: 0.3

vendor:mozillamodel:network security servicesscope:neversion:3.41.1

Trust: 0.3

sources: BID: 107257 // JVNDB: JVNDB-2018-016512 // NVD: CVE-2018-18508

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-18508
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-18508
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201902-594
value: MEDIUM

Trust: 0.6

VULMON: CVE-2018-18508
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-18508
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2018-18508
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2018-18508
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2018-18508 // JVNDB: JVNDB-2018-016512 // CNNVD: CNNVD-201902-594 // NVD: CVE-2018-18508

PROBLEMTYPE DATA

problemtype:CWE-476

Trust: 1.0

problemtype:NULL Pointer dereference (CWE-476) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2018-016512 // NVD: CVE-2018-18508

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 151881 // PACKETSTORM: 151880 // CNNVD: CNNVD-201902-594

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-201902-594

PATCH

title:SSA-379803url:https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.36.7_release_notes

Trust: 0.8

title:nss Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89391

Trust: 0.6

title:Debian CVElist Bug Report Logs: nss: CVE-2018-18508: NULL pointer dereference in several CMS functions resulting in a denial of serviceurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=cf52b51fc0bbd2d3441029e3dfb6b203

Trust: 0.1

title:Red Hat: Moderate: nss and nspr security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191951 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: nss vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3898-1

Trust: 0.1

title:Ubuntu Security Notice: nss vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3898-2

Trust: 0.1

sources: VULMON: CVE-2018-18508 // JVNDB: JVNDB-2018-016512 // CNNVD: CNNVD-201902-594

EXTERNAL IDS

db:NVDid:CVE-2018-18508

Trust: 3.2

db:SIEMENSid:SSA-379803

Trust: 1.6

db:ICS CERTid:ICSA-21-040-04

Trust: 1.6

db:JVNid:JVNVU91083521

Trust: 0.8

db:JVNDBid:JVNDB-2018-016512

Trust: 0.8

db:PACKETSTORMid:153834

Trust: 0.7

db:PACKETSTORMid:156770

Trust: 0.7

db:PACKETSTORMid:151881

Trust: 0.7

db:AUSCERTid:ESB-2021.0491

Trust: 0.6

db:AUSCERTid:ESB-2020.0001

Trust: 0.6

db:AUSCERTid:ESB-2020.3355

Trust: 0.6

db:AUSCERTid:ESB-2019.2864

Trust: 0.6

db:AUSCERTid:ESB-2019.0683

Trust: 0.6

db:CNNVDid:CNNVD-201902-594

Trust: 0.6

db:BIDid:107257

Trust: 0.3

db:VULMONid:CVE-2018-18508

Trust: 0.1

db:PACKETSTORMid:151880

Trust: 0.1

sources: VULMON: CVE-2018-18508 // BID: 107257 // JVNDB: JVNDB-2018-016512 // PACKETSTORM: 153834 // PACKETSTORM: 156770 // PACKETSTORM: 151881 // PACKETSTORM: 151880 // CNNVD: CNNVD-201902-594 // NVD: CVE-2018-18508

REFERENCES

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04

Trust: 2.2

url:https://developer.mozilla.org/en-us/docs/mozilla/projects/nss/nss_3.41.1_release_notes

Trust: 2.0

url:https://nvd.nist.gov/vuln/detail/cve-2018-18508

Trust: 1.8

url:https://developer.mozilla.org/en-us/docs/mozilla/projects/nss/nss_3.36.7_release_notes

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf

Trust: 1.6

url:https://jvn.jp/vu/jvnvu91083521/

Trust: 0.8

url:https://access.redhat.com/errata/rhsa-2019:1951

Trust: 0.7

url:https://lists.debian.org/debian-lts-announce/2019/03/msg00006.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20193395-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0491

Trust: 0.6

url:https://packetstormsecurity.com/files/156770/gentoo-linux-security-advisory-202003-37.html

Trust: 0.6

url:https://packetstormsecurity.com/files/153834/red-hat-security-advisory-2019-1951-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/151881/ubuntu-security-notice-usn-3898-2.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3355/

Trust: 0.6

url:https://vigilance.fr/vulnerability/mozilla-nss-null-pointer-dereference-via-cms-28417

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2864/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0001/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/76506

Trust: 0.6

url:https://usn.ubuntu.com/3898-1/

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2018-18508

Trust: 0.4

url:https://hg.mozilla.org/projects/nss/rev/5e70b72131ac

Trust: 0.3

url:https://hg.mozilla.org/projects/nss/rev/08d1b0c1117f

Trust: 0.3

url:http://www.mozilla.com/en-us/

Trust: 0.3

url:https://ftp.mozilla.org/pub/security/nss/releases/nss_3_41_1_rtm/src/

Trust: 0.3

url:https://developer.mozilla.org/en-us/docs/mozilla/projects/nss

Trust: 0.3

url:https://bugzilla.redhat.com/show_bug.cgi?id=cve-2018-18508

Trust: 0.3

url:https://usn.ubuntu.com/3898-2/

Trust: 0.3

url:https://usn.ubuntu.com/usn/usn-3898-1

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/476.html

Trust: 0.1

url:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921614

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11729

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11727

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-11729

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-11719

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-11727

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11719

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-11696

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11745

Trust: 0.1

url:https://security.gentoo.org/glsa/202003-37

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-11695

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-11697

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-11698

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3898-2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/nss/2:3.28.4-0ubuntu0.14.04.5

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/nss/2:3.28.4-0ubuntu0.16.04.5

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/nss/2:3.35-2ubuntu2.2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/nss/2:3.36.1-1ubuntu1.2

Trust: 0.1

sources: VULMON: CVE-2018-18508 // BID: 107257 // JVNDB: JVNDB-2018-016512 // PACKETSTORM: 153834 // PACKETSTORM: 156770 // PACKETSTORM: 151881 // PACKETSTORM: 151880 // CNNVD: CNNVD-201902-594 // NVD: CVE-2018-18508

CREDITS

Ubuntu,Red Hat,Gentoo

Trust: 0.6

sources: CNNVD: CNNVD-201902-594

SOURCES

db:VULMONid:CVE-2018-18508
db:BIDid:107257
db:JVNDBid:JVNDB-2018-016512
db:PACKETSTORMid:153834
db:PACKETSTORMid:156770
db:PACKETSTORMid:151881
db:PACKETSTORMid:151880
db:CNNVDid:CNNVD-201902-594
db:NVDid:CVE-2018-18508

LAST UPDATE DATE

2024-11-23T19:42:33.865000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2018-18508date:2021-02-18T00:00:00
db:BIDid:107257date:2019-01-22T00:00:00
db:JVNDBid:JVNDB-2018-016512date:2021-05-24T08:00:00
db:CNNVDid:CNNVD-201902-594date:2021-08-16T00:00:00
db:NVDid:CVE-2018-18508date:2024-11-21T03:56:04.393

SOURCES RELEASE DATE

db:VULMONid:CVE-2018-18508date:2020-10-22T00:00:00
db:BIDid:107257date:2019-01-22T00:00:00
db:JVNDBid:JVNDB-2018-016512date:2021-05-24T00:00:00
db:PACKETSTORMid:153834date:2019-07-30T22:08:23
db:PACKETSTORMid:156770date:2020-03-16T22:35:27
db:PACKETSTORMid:151881date:2019-02-27T19:23:00
db:PACKETSTORMid:151880date:2019-02-27T19:22:00
db:CNNVDid:CNNVD-201902-594date:2019-02-01T00:00:00
db:NVDid:CVE-2018-18508date:2020-10-22T21:15:12.467