Cryptographic Issues Affecting nss package, versions <2:3.26-1+debu8u1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN8-NSS-421336
- published 31 Jan 2016
- disclosed 31 Jan 2016
Introduced: 31 Jan 2016
CVE-2016-1938 Open this link in a new tabHow to fix?
Upgrade Debian:8
nss
to version 2:3.26-1+debu8u1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss
package and not the nss
package as distributed by Debian
.
See How to fix?
for Debian:8
relevant fixed versions and status.
The s_mp_div function in lib/freebl/mpi/mpi.c in Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, improperly divides numbers, which might make it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging use of the (1) mp_div or (2) mp_exptmod function.
References
- https://security-tracker.debian.org/tracker/CVE-2016-1938
- https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
- http://www.debian.org/security/2016/dsa-3688
- https://security.gentoo.org/glsa/201605-06
- https://security.gentoo.org/glsa/201701-46
- https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes
- https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c
- https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c
- http://www.mozilla.org/security/announce/2016/mfsa2016-07.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1190248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1194947
- http://www.securityfocus.com/bid/81955
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1034825
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-1938
- http://www.ubuntu.com/usn/USN-2880-1
- http://www.ubuntu.com/usn/USN-2880-2
- http://www.ubuntu.com/usn/USN-2903-1
- http://www.ubuntu.com/usn/USN-2903-2
- http://www.ubuntu.com/usn/USN-2973-1