nss-3.16.1-2.AXS3
エラータID: AXSA:2014-538:03
Description :
Network Security Services (NSS) is a set of libraries designed to
support cross-platform development of security-enabled client and
server applications. Applications built with NSS can support SSL v2
and v3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509
v3 certificates, and other security standards.
Security issues fixed with this release:
CVE-2013-1740
The ssl_Do1stHandshake function in sslsecur.c in libssl in Mozilla Network Security Services (NSS) before 3.15.4, when the TLS False Start feature is enabled, allows man-in-the-middle attackers to spoof SSL servers by using an arbitrary X.509 certificate during certain handshake traffic.
CVE-2014-1490
Race condition in libssl in Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors involving a resumption handshake that triggers incorrect replacement of a session ticket.
CVE-2014-1491
Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value.
CVE-2014-1492
The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) before 3.16 accepts a wildcard character that is embedded in an internationalized domain name's U-label, which might allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
CVE-2014-1545
Mozilla Netscape Portable Runtime (NSPR) before 4.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via vectors involving the sprintf and console functions.
fixed bugs;
* Previously, the shell in the Network Security Services (NSS) specification handled test failures incorrectly as false positive test results, when the output.log file was not present on the system. So, certain utilities, such as "grep", could not handle failures properly. With this update, fixed it.
* Previously, a subordinate Certificate Authority (CA) of the ANSSI agency incorrectly issued an intermediate certificate installed on a network monitoring device. So, the monitoring device was enabled to act as an MITM (Man in the Middle) proxy performing traffic management of domain names or IP addresses that the certificate holder did not own or control. The trust in the intermediate certificate to issue the certificate for an MITM device has been revoked, and such a device can no longer be used for MITM attacks.
* Previously, MD5 certificates were rejected by default because Network Security Services (NSS) did not trust MD5 certificates. With this update, fixed it.
update package.
The ssl_Do1stHandshake function in sslsecur.c in libssl in Mozilla Network Security Services (NSS) before 3.15.4, when the TLS False Start feature is enabled, allows man-in-the-middle attackers to spoof SSL servers by using an arbitrary X.509 certificate during certain handshake traffic.
Race condition in libssl in Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors involving a resumption handshake that triggers incorrect replacement of a session ticket.
Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value.
The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) before 3.16 accepts a wildcard character that is embedded in an internationalized domain name's U-label, which might allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
Mozilla Netscape Portable Runtime (NSPR) before 4.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via vectors involving the sprintf and console functions.
N/A
SRPMS
- nss-3.16.1-2.AXS3.src.rpm
MD5: c5cecfee41c77d70b16b9cc564be9291
SHA-256: 2e061a17fe0e2839e7093ddd33e2d676912bb0239180801cab5eb5ab501a6526
Size: 6.14 MB
Asianux Server 3 for x86
- nss-3.16.1-2.AXS3.i386.rpm
MD5: 40e0163f8f505489815eafa276c8bc66
SHA-256: d991ae3f4beaee3dc3cdd2afda0bd051e41373e8ce6d6159d0c9874d036b415a
Size: 1.24 MB - nss-devel-3.16.1-2.AXS3.i386.rpm
MD5: cf165b21a711aa4e7b1b40b4ff90ce0e
SHA-256: af7f7dc8dfdab2b022ac1c35d9e5882119a7891bf96d68d8f70d619eb7a57f7d
Size: 248.93 kB - nss-tools-3.16.1-2.AXS3.i386.rpm
MD5: 2429f3c3099024f8b520ccf4390b8fe9
SHA-256: 4ada29f2b42cd8460463f357458cbc2f0f8a8e1e5b083b35aa33d8f654f88f1a
Size: 751.49 kB
Asianux Server 3 for x86_64
- nss-3.16.1-2.AXS3.x86_64.rpm
MD5: d41dbc166efe076cd05203b25f5a9b6d
SHA-256: fd0529f4ce34422e2ac92aed5efb870007a4c1b39dfbda1eac84d05cda1c9c9c
Size: 1.26 MB - nss-devel-3.16.1-2.AXS3.x86_64.rpm
MD5: 0412f6ea64a71916ffdc721bd359242f
SHA-256: 1ce4ea6071fb4676932ce7d6d060164ddfece4bb562f3647ca41abb4dfac49b8
Size: 248.96 kB - nss-tools-3.16.1-2.AXS3.x86_64.rpm
MD5: 493118a9a4822a9758ead505f7d916e5
SHA-256: 01e1ece4b616681c888d24fb4d31b2c90ffd0e6b6f0875e6dde0da39e1739814
Size: 757.99 kB