nss before version 3.30 is vulnerable to a remote denial of service during the session handshake when using SessionTicket extension and ECDHE-ECDSA.
The product does not implement a required step in a cryptographic algorithm, resulting in weaker encryption than advertised by the algorithm.
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Link | Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1320695 | issue tracking patch exploit third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9574 | issue tracking exploit third party advisory |