In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes | release notes vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1539788 | issue tracking patch vendor advisory exploit |
https://security.netapp.com/advisory/ntap-20210129-0001/ | third party advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf | third party advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04 | third party advisory us government resource |