CVE-2014-1568
Severity CVSS v4.0:
Pending analysis
Type:
CWE-310
Cryptographic Issues
Publication date:
25/09/2014
Last modified:
12/04/2025
Description
Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a "signature malleability" issue.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* | 37.0.2062.120 (including) | |
| cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* | 32.0 (including) | |
| cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:32.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:32.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox_esr:24.8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:* | 3.16.2.0 (including) | |
| cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html
- http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html
- http://rhn.redhat.com/errata/RHSA-2014-1307.html
- http://rhn.redhat.com/errata/RHSA-2014-1354.html
- http://rhn.redhat.com/errata/RHSA-2014-1371.html
- http://secunia.com/advisories/61540
- http://secunia.com/advisories/61574
- http://secunia.com/advisories/61575
- http://secunia.com/advisories/61576
- http://secunia.com/advisories/61583
- http://www.debian.org/security/2014/dsa-3033
- http://www.debian.org/security/2014/dsa-3034
- http://www.debian.org/security/2014/dsa-3037
- http://www.kb.cert.org/vuls/id/772676
- http://www.mozilla.org/security/announce/2014/mfsa2014-73.html
- http://www.novell.com/support/kb/doc.php?id=7015701
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/70116
- http://www.ubuntu.com/usn/USN-2360-1
- http://www.ubuntu.com/usn/USN-2360-2
- http://www.ubuntu.com/usn/USN-2361-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1064636
- https://bugzilla.mozilla.org/show_bug.cgi?id=1069405
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96194
- https://security.gentoo.org/glsa/201504-01
- http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html
- http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html
- http://rhn.redhat.com/errata/RHSA-2014-1307.html
- http://rhn.redhat.com/errata/RHSA-2014-1354.html
- http://rhn.redhat.com/errata/RHSA-2014-1371.html
- http://secunia.com/advisories/61540
- http://secunia.com/advisories/61574
- http://secunia.com/advisories/61575
- http://secunia.com/advisories/61576
- http://secunia.com/advisories/61583
- http://www.debian.org/security/2014/dsa-3033
- http://www.debian.org/security/2014/dsa-3034
- http://www.debian.org/security/2014/dsa-3037
- http://www.kb.cert.org/vuls/id/772676
- http://www.mozilla.org/security/announce/2014/mfsa2014-73.html
- http://www.novell.com/support/kb/doc.php?id=7015701
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/70116
- http://www.ubuntu.com/usn/USN-2360-1
- http://www.ubuntu.com/usn/USN-2360-2
- http://www.ubuntu.com/usn/USN-2361-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1064636
- https://bugzilla.mozilla.org/show_bug.cgi?id=1069405
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96194
- https://security.gentoo.org/glsa/201504-01



