SB2024072315 - SUSE update for mozilla-nss



SB2024072315 - SUSE update for mozilla-nss

Published: July 23, 2024

Security Bulletin ID SB2024072315
Severity
High
Patch available
YES
Number of vulnerabilities 21
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 76% Medium 5% Low 19%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 21 secuirty vulnerabilities.


1) Covert timing channel (CVE-ID: CVE-2023-5388)

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to insufficient fix for #VU84108 (CVE-2023-4421). A remote attacker can perform Marvin attack and gain access to sensitive information.


2) Use-after-free error (CVE-ID: CVE-2017-13797)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to use-after-free error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

3) Memory corruption (CVE-ID: CVE-2017-13803)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

4) Memory corruption (CVE-ID: CVE-2017-13802)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

5) Memory corruption (CVE-ID: CVE-2017-13798)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

6) Memory corruption (CVE-ID: CVE-2017-13796)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

7) Memory corruption (CVE-ID: CVE-2017-13795)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

8) Memory corruption (CVE-ID: CVE-2017-13794)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

9) Memory corruption (CVE-ID: CVE-2017-13793)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

10) Memory corruption (CVE-ID: CVE-2017-13792)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

11) Memory corruption (CVE-ID: CVE-2017-13791)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

12) Memory corruption (CVE-ID: CVE-2017-13788)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

13) Memory corruption (CVE-ID: CVE-2017-13785)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

14) Memory corruption (CVE-ID: CVE-2017-13784)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

15) Memory corruption (CVE-ID: CVE-2017-13783)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

16) Improper access control (CVE-ID: CVE-2017-7113)

The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.

The weakness exists due to a flaw in the UIKit component. A local attacker can view characters in a secure text field during focus change events.

17) Improper input validation (CVE-ID: CVE-2017-13804)

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to improper input validation. A remote attacker can trick the victim into opening a specially crafted zip file, trigger a path handling flaw in the StreamingZip component and modify restricted areas of the file system.

18) Improper access control (CVE-ID: CVE-2017-13805)

The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.

The weakness exists due to a flaw in the Siri component. A local attacker can use Siri to read notifications of content that is set not to be displayed at the lock screen.

19) Improper access control (CVE-ID: CVE-2017-13844)

The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.

The weakness exists due to a flaw in the Messages application. A local attacker can supply Reply With Message and access photos from the lock screen.

20) Memory corruption (CVE-ID: CVE-2017-13799)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the kernel component. A remote attacker can trigger memory corruption and execute arbitrary code with kernel privileges.

21) Memory corruption (CVE-ID: CVE-2017-13849)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to memory handling error in the CoreText component. A remote attacker can supply a specially crafted text file, trigger memory corruption and cause an unexpected application termination.

Remediation

Install update from vendor's website.