|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for nss and nspr RHSA-2014:0916-01|
|Summary:||The remote host is missing an update for the 'nss and nspr'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'nss and nspr'
package(s) announced via the referenced advisory.
Network Security Services (NSS) is a set of libraries designed to support
the cross-platform development of security-enabled client and server
applications. Netscape Portable Runtime (NSPR) provides platform
independence for non-GUI operating system facilities.
A race condition was found in the way NSS verified certain certificates.
A remote attacker could use this flaw to crash an application using NSS or,
possibly, execute arbitrary code with the privileges of the user running
that application. (CVE-2014-1544)
Red Hat would like to thank the Mozilla project for reporting
CVE-2014-1544. Upstream acknowledges Tyson Smith and Jesse Schwartzentruber
as the original reporters.
Users of NSS and NSPR are advised to upgrade to these updated packages,
which correct this issue. After installing this update, applications using
NSS or NSPR must be restarted for this update to take effect.
nss and nspr on Red Hat Enterprise Linux (v. 5 server),
Red Hat Enterprise Linux Server (v. 7)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2014-1544|
BugTraq ID: 68816
Debian Security Information: DSA-2986 (Google Search)
Debian Security Information: DSA-2996 (Google Search)
|Copyright||Copyright (C) 2014 Greenbone Networks GmbH|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.