In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
References
Link | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1539788 | Exploit Issue Tracking Patch Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf | Third Party Advisory |
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes | Release Notes Vendor Advisory |
https://security.netapp.com/advisory/ntap-20210129-0001/ | Third Party Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
|
Configuration 10 (hide)
|
History
19 Feb 2021, 16:59
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf - Third Party Advisory | |
References | (MISC) https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04 - Third Party Advisory, US Government Resource | |
CPE | cpe:2.3:h:siemens:ruggedcom_rox_rx5000:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:ruggedcom_rox_rx1510:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:ruggedcom_rox_rx1512:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:ruggedcom_rox_rx1501_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:ruggedcom_rox_rx1400:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:ruggedcom_rox_rx1512_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:ruggedcom_rox_rx1510_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:ruggedcom_rox_mx5000:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:ruggedcom_rox_rx1501:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:ruggedcom_rox_rx1511:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:ruggedcom_rox_mx5000_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:ruggedcom_rox_rx5000_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:ruggedcom_rox_rx1511_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:ruggedcom_rox_rx1500:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:ruggedcom_rox_rx1400_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:ruggedcom_rox_rx1500_firmware:*:*:*:*:*:*:*:* |
12 Feb 2021, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Feb 2021, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Jan 2021, 01:31
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:* |
|
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20210129-0001/ - Third Party Advisory |
29 Jan 2021, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2020-10-22 21:15
Updated : 2023-12-10 13:41
NVD link : CVE-2019-17006
Mitre link : CVE-2019-17006
CVE.ORG link : CVE-2019-17006
JSON object : View
Products Affected
siemens
- ruggedcom_rox_rx1500
- ruggedcom_rox_rx1510_firmware
- ruggedcom_rox_rx1512
- ruggedcom_rox_rx1400_firmware
- ruggedcom_rox_rx1500_firmware
- ruggedcom_rox_rx5000
- ruggedcom_rox_mx5000
- ruggedcom_rox_rx1510
- ruggedcom_rox_mx5000_firmware
- ruggedcom_rox_rx5000_firmware
- ruggedcom_rox_rx1512_firmware
- ruggedcom_rox_rx1501
- ruggedcom_rox_rx1511
- ruggedcom_rox_rx1511_firmware
- ruggedcom_rox_rx1501_firmware
- ruggedcom_rox_rx1400
mozilla
- network_security_services
netapp
- hci_management_node
- hci_compute_node
- hci_storage_node
- solidfire