|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for nss RHSA-2017:1365-03|
|Summary:||The remote host is missing an update for the 'nss'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'nss'
package(s) announced via the referenced advisory.
Network Security Services (NSS) is a set of
libraries designed to support the cross-platform development of security-enabled
client and server applications.
* A null pointer dereference flaw was found in the way NSS handled empty
SSLv2 messages. An attacker could use this flaw to crash a server
application compiled against the NSS library. (CVE-2017-7502)
* The Network Security Services (NSS) code and Certificate Authority (CA)
list have been updated to meet the recommendations as published with the
latest Mozilla Firefox Extended Support Release (ESR). The updated CA list
improves compatibility with the certificates that are used in the Internet
Public Key Infrastructure (PKI). To avoid certificate validation refusals,
Red Hat recommends installing the updated CA list on June 12, 2017.
nss on Red Hat Enterprise Linux Server (v. 7)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2017-7502|
BugTraq ID: 98744
Debian Security Information: DSA-3872 (Google Search)
RedHat Security Advisories: RHSA-2017:1364
RedHat Security Advisories: RHSA-2017:1365
RedHat Security Advisories: RHSA-2017:1567
RedHat Security Advisories: RHSA-2017:1712
|Copyright||Copyright (C) 2017 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.