Show plain JSON{"id": "CVE-2015-7181", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2015-11-05T05:59:05.603", "references": [{"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html", "source": "security@mozilla.org"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html", "source": "security@mozilla.org"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html", "source": "security@mozilla.org"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html", "source": "security@mozilla.org"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html", "source": "security@mozilla.org"}, {"url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html", "source": "security@mozilla.org"}, {"url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html", "source": "security@mozilla.org"}, {"url": "http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html", "source": "security@mozilla.org"}, {"url": "http://rhn.redhat.com/errata/RHSA-2015-1980.html", "source": "security@mozilla.org"}, {"url": "http://rhn.redhat.com/errata/RHSA-2015-1981.html", "source": "security@mozilla.org"}, {"url": "http://www.debian.org/security/2015/dsa-3393", "source": "security@mozilla.org"}, {"url": "http://www.debian.org/security/2015/dsa-3410", "source": "security@mozilla.org"}, {"url": "http://www.debian.org/security/2016/dsa-3688", "source": "security@mozilla.org"}, {"url": "http://www.mozilla.org/security/announce/2015/mfsa2015-133.html", "tags": ["Vendor Advisory"], "source": "security@mozilla.org"}, {"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", "source": "security@mozilla.org"}, {"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "source": "security@mozilla.org"}, {"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "source": "security@mozilla.org"}, {"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "source": "security@mozilla.org"}, {"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "source": "security@mozilla.org"}, {"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "source": "security@mozilla.org"}, {"url": "http://www.securityfocus.com/bid/77416", "source": "security@mozilla.org"}, {"url": "http://www.securityfocus.com/bid/91787", "source": "security@mozilla.org"}, {"url": "http://www.securitytracker.com/id/1034069", "source": "security@mozilla.org"}, {"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753", "source": "security@mozilla.org"}, {"url": "http://www.ubuntu.com/usn/USN-2785-1", "source": "security@mozilla.org"}, {"url": "http://www.ubuntu.com/usn/USN-2791-1", "source": "security@mozilla.org"}, {"url": "http://www.ubuntu.com/usn/USN-2819-1", "source": "security@mozilla.org"}, {"url": "https://bto.bluecoat.com/security-advisory/sa119", "source": "security@mozilla.org"}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1192028", "source": "security@mozilla.org"}, {"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes", "tags": ["Vendor Advisory"], "source": "security@mozilla.org"}, {"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes", "tags": ["Vendor Advisory"], "source": "security@mozilla.org"}, {"url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes", "tags": ["Vendor Advisory"], "source": "security@mozilla.org"}, {"url": "https://security.gentoo.org/glsa/201512-10", "source": "security@mozilla.org"}, {"url": "https://security.gentoo.org/glsa/201605-06", "source": "security@mozilla.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "The sec_asn1d_parse_leaf function in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, improperly restricts access to an unspecified data structure, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data, related to a \"use-after-poison\" issue."}, {"lang": "es", "value": "La funci\u00f3n sec_asn1d_parse_leaf en Mozilla Network Security Services (NSS) en versiones anteriores a 3.19.2.1 y 3.20.x en versiones anteriores a 3.20.1, como se utiliza en Firefox en versiones anteriores a 42.0 y Firefox ESR 38.x en versiones anteriores a 38.4 y otros productos, restringe el acceso de manera incorrecta a una estructura de datos no especificada, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) o posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de datos OCTET STRING manipulados, relacionado con un problema 'use-after-poison'."}], "lastModified": "2017-11-04T01:29:08.770", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39EA735D-20A8-4595-BFF8-7B1F5A32CDA2", "versionEndIncluding": "3.19.2.0"}, {"criteria": "cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "95762E75-6DEC-4B1C-87B4-A4EA1937B710"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A741F21D-4095-47E0-AAB4-DDBDAAC5BAB1", "versionEndIncluding": "41.0.2"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A1DD76B-7682-4F61-B274-115D8A9B5306"}, {"criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "332589F6-C6DB-4204-97FA-B60105BBF146"}, {"criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A04D6EAE-C709-4752-976E-DB15EE6E85B0"}, {"criteria": "cpe:2.3:a:mozilla:firefox_esr:38.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE52B8E3-3BA8-46DB-948E-958739FE91B1"}, {"criteria": "cpe:2.3:a:mozilla:firefox_esr:38.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "818D58B7-3BA2-4CE5-9D9A-65F5B24AB6D0"}, {"criteria": "cpe:2.3:a:mozilla:firefox_esr:38.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B50189A6-C058-46EA-9BE8-9D01E304D518"}, {"criteria": "cpe:2.3:a:mozilla:firefox_esr:38.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F5442BB-3E3F-4E91-B76B-6B379B47E2BD"}, {"criteria": "cpe:2.3:a:mozilla:firefox_esr:38.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3FF3D499-08B8-4180-86C8-A38609D8938B"}], "operator": "OR"}]}], "sourceIdentifier": "security@mozilla.org"}