SB2024072315 - SUSE update for mozilla-nss
Published: July 23, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 21 secuirty vulnerabilities.
1) Covert timing channel (CVE-ID: CVE-2023-5388)
The vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to insufficient fix for #VU84108 (CVE-2023-4421). A remote attacker can perform Marvin attack and gain access to sensitive information.
2) Use-after-free error (CVE-ID: CVE-2017-13797)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to use-after-free error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
3) Memory corruption (CVE-ID: CVE-2017-13803)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
4) Memory corruption (CVE-ID: CVE-2017-13802)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
5) Memory corruption (CVE-ID: CVE-2017-13798)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
6) Memory corruption (CVE-ID: CVE-2017-13796)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
7) Memory corruption (CVE-ID: CVE-2017-13795)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
8) Memory corruption (CVE-ID: CVE-2017-13794)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
9) Memory corruption (CVE-ID: CVE-2017-13793)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
10) Memory corruption (CVE-ID: CVE-2017-13792)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
11) Memory corruption (CVE-ID: CVE-2017-13791)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
12) Memory corruption (CVE-ID: CVE-2017-13788)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
13) Memory corruption (CVE-ID: CVE-2017-13785)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
14) Memory corruption (CVE-ID: CVE-2017-13784)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
15) Memory corruption (CVE-ID: CVE-2017-13783)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
16) Improper access control (CVE-ID: CVE-2017-7113)
The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.The weakness exists due to a flaw in the UIKit component. A local attacker can view characters in a secure text field during focus change events.
17) Improper input validation (CVE-ID: CVE-2017-13804)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to improper input validation. A remote attacker can trick the victim into opening a specially crafted zip file, trigger a path handling flaw in the StreamingZip component and modify restricted areas of the file system.
18) Improper access control (CVE-ID: CVE-2017-13805)
The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.The weakness exists due to a flaw in the Siri component. A local attacker can use Siri to read notifications of content that is set not to be displayed at the lock screen.
19) Improper access control (CVE-ID: CVE-2017-13844)
The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.The weakness exists due to a flaw in the Messages application. A local attacker can supply Reply With Message and access photos from the lock screen.
20) Memory corruption (CVE-ID: CVE-2017-13799)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the kernel component. A remote attacker can trigger memory corruption and execute arbitrary code with kernel privileges.
21) Memory corruption (CVE-ID: CVE-2017-13849)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to memory handling error in the CoreText component. A remote attacker can supply a specially crafted text file, trigger memory corruption and cause an unexpected application termination.
Remediation
Install update from vendor's website.