Key Management Errors Affecting nss package, versions <2:3.25-1
Snyk CVSS
Attack Complexity
High
Confidentiality
High
Threat Intelligence
EPSS
0.19% (57th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-NSS-421269
- published 27 Jun 2018
- disclosed 1 Aug 2018
How to fix?
Upgrade Debian:10
nss
to version 2:3.25-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream nss
package and not the nss
package as distributed by Debian
.
See How to fix?
for Debian:10
relevant fixed versions and status.
It was found that Diffie Hellman Client key exchange handling in NSS 3.21.x was vulnerable to small subgroup confinement attack. An attacker could use this flaw to recover private keys by confining the client DH key to small subgroup of the desired group.
References
- https://security-tracker.debian.org/tracker/CVE-2016-8635
- https://security.gentoo.org/glsa/201701-46
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8635
- http://rhn.redhat.com/errata/RHSA-2016-2779.html
- http://www.securityfocus.com/bid/94346
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-8635