var-202001-1433
Vulnerability from variot

When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71. Firefox and Thunderbird Contains an out-of-bounds write vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: nss-softokn security update Advisory ID: RHSA-2020:1267-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:1267 Issue date: 2020-04-01 CVE Names: CVE-2018-0495 CVE-2019-11745 ==================================================================== 1. Summary:

An update for nss-softokn is now available for Red Hat Enterprise Linux 7.5 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux ComputeNode EUS (v. 7.5) - x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.5) - ppc64, ppc64le, s390x, x86_64

  1. Description:

The nss-softokn package provides the Network Security Services Softoken Cryptographic Module.

Security Fix(es):

  • nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate (CVE-2019-11745)

  • ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

  1. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1591163 - CVE-2018-0495 ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries 1774831 - CVE-2019-11745 nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate

  1. Package List:

Red Hat Enterprise Linux ComputeNode EUS (v. 7.5):

Source: nss-softokn-3.36.0-6.el7_5.src.rpm

x86_64: nss-softokn-3.36.0-6.el7_5.i686.rpm nss-softokn-3.36.0-6.el7_5.x86_64.rpm nss-softokn-debuginfo-3.36.0-6.el7_5.i686.rpm nss-softokn-debuginfo-3.36.0-6.el7_5.x86_64.rpm nss-softokn-freebl-3.36.0-6.el7_5.i686.rpm nss-softokn-freebl-3.36.0-6.el7_5.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5):

x86_64: nss-softokn-debuginfo-3.36.0-6.el7_5.i686.rpm nss-softokn-debuginfo-3.36.0-6.el7_5.x86_64.rpm nss-softokn-devel-3.36.0-6.el7_5.i686.rpm nss-softokn-devel-3.36.0-6.el7_5.x86_64.rpm nss-softokn-freebl-devel-3.36.0-6.el7_5.i686.rpm nss-softokn-freebl-devel-3.36.0-6.el7_5.x86_64.rpm

Red Hat Enterprise Linux Server EUS (v. 7.5):

Source: nss-softokn-3.36.0-6.el7_5.src.rpm

ppc64: nss-softokn-3.36.0-6.el7_5.ppc.rpm nss-softokn-3.36.0-6.el7_5.ppc64.rpm nss-softokn-debuginfo-3.36.0-6.el7_5.ppc.rpm nss-softokn-debuginfo-3.36.0-6.el7_5.ppc64.rpm nss-softokn-devel-3.36.0-6.el7_5.ppc.rpm nss-softokn-devel-3.36.0-6.el7_5.ppc64.rpm nss-softokn-freebl-3.36.0-6.el7_5.ppc.rpm nss-softokn-freebl-3.36.0-6.el7_5.ppc64.rpm nss-softokn-freebl-devel-3.36.0-6.el7_5.ppc.rpm nss-softokn-freebl-devel-3.36.0-6.el7_5.ppc64.rpm

ppc64le: nss-softokn-3.36.0-6.el7_5.ppc64le.rpm nss-softokn-debuginfo-3.36.0-6.el7_5.ppc64le.rpm nss-softokn-devel-3.36.0-6.el7_5.ppc64le.rpm nss-softokn-freebl-3.36.0-6.el7_5.ppc64le.rpm nss-softokn-freebl-devel-3.36.0-6.el7_5.ppc64le.rpm

s390x: nss-softokn-3.36.0-6.el7_5.s390.rpm nss-softokn-3.36.0-6.el7_5.s390x.rpm nss-softokn-debuginfo-3.36.0-6.el7_5.s390.rpm nss-softokn-debuginfo-3.36.0-6.el7_5.s390x.rpm nss-softokn-devel-3.36.0-6.el7_5.s390.rpm nss-softokn-devel-3.36.0-6.el7_5.s390x.rpm nss-softokn-freebl-3.36.0-6.el7_5.s390.rpm nss-softokn-freebl-3.36.0-6.el7_5.s390x.rpm nss-softokn-freebl-devel-3.36.0-6.el7_5.s390.rpm nss-softokn-freebl-devel-3.36.0-6.el7_5.s390x.rpm

x86_64: nss-softokn-3.36.0-6.el7_5.i686.rpm nss-softokn-3.36.0-6.el7_5.x86_64.rpm nss-softokn-debuginfo-3.36.0-6.el7_5.i686.rpm nss-softokn-debuginfo-3.36.0-6.el7_5.x86_64.rpm nss-softokn-devel-3.36.0-6.el7_5.i686.rpm nss-softokn-devel-3.36.0-6.el7_5.x86_64.rpm nss-softokn-freebl-3.36.0-6.el7_5.i686.rpm nss-softokn-freebl-3.36.0-6.el7_5.x86_64.rpm nss-softokn-freebl-devel-3.36.0-6.el7_5.i686.rpm nss-softokn-freebl-devel-3.36.0-6.el7_5.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2018-0495 https://access.redhat.com/security/cve/CVE-2019-11745 https://access.redhat.com/security/updates/classification/#important

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBXoRSIdzjgjWX9erEAQiVqQ//TH1K6R0uTAuq11Q7PXmGjTPUa2/clEuk c008m2G1x4AWmPocvtPpPhKe0BUviGxFtAGTrhJx5f2be2YmRZ+JHFRYwHI3lKM2 YJjMwSW0vohBhVXudOvG7+cWfbkKt1i0a8N+2IaSH0VcgUEOvhyPVZ/22HwNUeaS loPZFyJOJZy76heQNzenvXLj1CRIlkGsxsvr0fxVHqNrNXn/k3jzPfBHtFxbawk1 QjwkAND/s8x9Qj8T7zby/2NXXi5y8yuI4PksOb2rmyjaPLtcAGujHtHsEGziyinW BJAyh7tkMxAcWxxMNEdRAZjVcErp99ZNaa4Ck+u9rEW7vPWYn6EunPnqnL1y9nCZ f/ZKICjXVkMqZq8Jp7WOmupmT1fGt1LSUYnJIiyn1u/6fZANh6BzgmR74RkX5OWc 2QSyU3FcZXT7ttaKtaGslCaT9ZLIn1grKhoTrqTrc1Z9IekJNBBm/5/FIzutNqd/ D6TIJbH82G03j1DXG2fvsRLfaDu0GTt6HXLEsK0JPlJZeXOwJdrGvJz3XYX1jo2o CF1R9lEXhkJXoxXn7e5EJ5Egl04vqqJ16qsWyynolhETK/dUkXf1x4Cdg3HeZ3CB m1EgllecBP+OLntAqaHihCzwpZEJaARI/xxKHpYd96KcsfqLtPKcc1uWDFHk64Tk rIqDkBJPd4A=xNcH -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .

Background

The Mozilla Network Security Service (NSS) is a library implementing security features like SSL v.2/v.3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME and X.509 certificates. 7.4) - x86_64

  1. ========================================================================== Ubuntu Security Notice USN-4241-1 January 16, 2020

thunderbird vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.10
  • Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in Thunderbird. (CVE-2019-17005, CVE-2019-17008, CVE-2019-17010, CVE-2019-17011, CVE-2019-17012, CVE-2019-17016, CVE-2019-17017, CVE-2019-17022, CVE-2019-17024, CVE-2019-17026)

It was discovered that NSS incorrectly handled certain memory operations. (CVE-2019-11745)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.10: thunderbird 1:68.4.1+build1-0ubuntu0.19.10.1

Ubuntu 18.04 LTS: thunderbird 1:68.4.1+build1-0ubuntu0.18.04.1

After a standard system update you need to restart Thunderbird to make all the necessary changes. 8.0) - ppc64le, x86_64

  1. Description:

Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202003-10


                                       https://security.gentoo.org/

Severity: High Title: Mozilla Thunderbird: Multiple vulnerabilities Date: March 14, 2020 Bugs: #698516, #702638, #709350, #712518 ID: 202003-10


Synopsis

Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.

Background

Mozilla Thunderbird is a popular open-source email client from the Mozilla project.

Affected packages

-------------------------------------------------------------------
 Package              /     Vulnerable     /            Unaffected
-------------------------------------------------------------------

1 mail-client/thunderbird < 68.6.0 >= 68.6.0 2 mail-client/thunderbird-bin < 68.6.0 >= 68.6.0 ------------------------------------------------------------------- 2 affected packages

Description

Multiple vulnerabilities have been discovered in Mozilla Thunderbird. Please review the CVE identifiers referenced below for details.

Impact

A remote attacker may be able to execute arbitrary code, cause a Denial of Service condition, obtain sensitive information, or conduct Cross-Site Request Forgery (CSRF).

Workaround

There is no known workaround at this time.

Resolution

All Mozilla Thunderbird users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-68.6.0"

All Mozilla Thunderbird binary users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot -v ">=mail-client/thunderbird-bin-68.6.0"

References

[ 1 ] MFSA-2019-35 https://www.mozilla.org/en-US/security/advisories/mfsa2019-35/ [ 2 ] MFSA-2019-37 https://www.mozilla.org/en-US/security/advisories/mfsa2019-37/ [ 3 ] MFSA-2020-07 https://www.mozilla.org/en-US/security/advisories/mfsa2020-07/ [ 4 ] MFSA-2020-10 https://www.mozilla.org/en-US/security/advisories/mfsa2020-10/ [ 5 ] CVE-2019-11745 https://nvd.nist.gov/vuln/detail/CVE-2019-11745 [ 6 ] CVE-2019-11757 https://nvd.nist.gov/vuln/detail/CVE-2019-11757 [ 7 ] CVE-2019-11759 https://nvd.nist.gov/vuln/detail/CVE-2019-11759 [ 8 ] CVE-2019-11760 https://nvd.nist.gov/vuln/detail/CVE-2019-11760 [ 9 ] CVE-2019-11761 https://nvd.nist.gov/vuln/detail/CVE-2019-11761 [ 10 ] CVE-2019-11762 https://nvd.nist.gov/vuln/detail/CVE-2019-11762 [ 11 ] CVE-2019-11763 https://nvd.nist.gov/vuln/detail/CVE-2019-11763 [ 12 ] CVE-2019-11764 https://nvd.nist.gov/vuln/detail/CVE-2019-11764 [ 13 ] CVE-2019-17005 https://nvd.nist.gov/vuln/detail/CVE-2019-17005 [ 14 ] CVE-2019-17008 https://nvd.nist.gov/vuln/detail/CVE-2019-17008 [ 15 ] CVE-2019-17010 https://nvd.nist.gov/vuln/detail/CVE-2019-17010 [ 16 ] CVE-2019-17011 https://nvd.nist.gov/vuln/detail/CVE-2019-17011 [ 17 ] CVE-2019-17012 https://nvd.nist.gov/vuln/detail/CVE-2019-17012 [ 18 ] CVE-2019-20503 https://nvd.nist.gov/vuln/detail/CVE-2019-20503 [ 19 ] CVE-2020-6792 https://nvd.nist.gov/vuln/detail/CVE-2020-6792 [ 20 ] CVE-2020-6793 https://nvd.nist.gov/vuln/detail/CVE-2020-6793 [ 21 ] CVE-2020-6794 https://nvd.nist.gov/vuln/detail/CVE-2020-6794 [ 22 ] CVE-2020-6795 https://nvd.nist.gov/vuln/detail/CVE-2020-6795 [ 23 ] CVE-2020-6798 https://nvd.nist.gov/vuln/detail/CVE-2020-6798 [ 24 ] CVE-2020-6800 https://nvd.nist.gov/vuln/detail/CVE-2020-6800 [ 25 ] CVE-2020-6805 https://nvd.nist.gov/vuln/detail/CVE-2020-6805 [ 26 ] CVE-2020-6806 https://nvd.nist.gov/vuln/detail/CVE-2020-6806 [ 27 ] CVE-2020-6807 https://nvd.nist.gov/vuln/detail/CVE-2020-6807 [ 28 ] CVE-2020-6811 https://nvd.nist.gov/vuln/detail/CVE-2020-6811 [ 29 ] CVE-2020-6812 https://nvd.nist.gov/vuln/detail/CVE-2020-6812 [ 30 ] CVE-2020-6814 https://nvd.nist.gov/vuln/detail/CVE-2020-6814

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/202003-10

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2020 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202001-1433",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "firefox esr",
        "scope": "lt",
        "trust": 1.8,
        "vendor": "mozilla",
        "version": "68.3"
      },
      {
        "model": "leap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "opensuse",
        "version": "15.1"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "18.04"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "19.10"
      },
      {
        "model": "ruggedcom rox rx1400",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "2.14.0"
      },
      {
        "model": "ruggedcom rox rx1512",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "2.14.0"
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "16.04"
      },
      {
        "model": "thunderbird",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "mozilla",
        "version": "68.3.0"
      },
      {
        "model": "ruggedcom rox rx1510",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "2.14.0"
      },
      {
        "model": "ruggedcom rox rx5000",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "2.14.0"
      },
      {
        "model": "firefox",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "mozilla",
        "version": "71.0"
      },
      {
        "model": "ruggedcom rox rx1500",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "2.14.0"
      },
      {
        "model": "ruggedcom rox rx1501",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "2.14.0"
      },
      {
        "model": "ruggedcom rox rx1511",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "2.14.0"
      },
      {
        "model": "ruggedcom rox mx5000",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "2.14.0"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.6"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "9.0"
      },
      {
        "model": "firefox",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "mozilla",
        "version": "71"
      },
      {
        "model": "thunderbird",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "mozilla",
        "version": "68.3"
      },
      {
        "model": "leap",
        "scope": null,
        "trust": 0.8,
        "vendor": "opensuse",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-013984"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-11745"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:mozilla:firefox",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:mozilla:firefox_esr",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:mozilla:thunderbird",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:opensuse_project:leap",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-013984"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Red Hat",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "157044"
      },
      {
        "db": "PACKETSTORM",
        "id": "157142"
      },
      {
        "db": "PACKETSTORM",
        "id": "156299"
      },
      {
        "db": "PACKETSTORM",
        "id": "156093"
      }
    ],
    "trust": 0.4
  },
  "cve": "CVE-2019-11745",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2019-11745",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2019-11745",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 8.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2019-11745",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-11745",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-11745",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-11745",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2019-11745"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-013984"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-11745"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 68.3, Firefox ESR \u003c 68.3, and Firefox \u003c 71. Firefox and Thunderbird Contains an out-of-bounds write vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n====================================================================                   \nRed Hat Security Advisory\n\nSynopsis:          Important: nss-softokn security update\nAdvisory ID:       RHSA-2020:1267-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2020:1267\nIssue date:        2020-04-01\nCVE Names:         CVE-2018-0495 CVE-2019-11745\n====================================================================\n1. Summary:\n\nAn update for nss-softokn is now available for Red Hat Enterprise Linux 7.5\nExtended Update Support. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux ComputeNode EUS (v. 7.5) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5) - x86_64\nRed Hat Enterprise Linux Server EUS (v. 7.5) - ppc64, ppc64le, s390x, x86_64\n\n3. Description:\n\nThe nss-softokn package provides the Network Security Services Softoken\nCryptographic Module. \n\nSecurity Fix(es):\n\n* nss: Out-of-bounds write when passing an output buffer smaller than the\nblock size to NSC_EncryptUpdate (CVE-2019-11745)\n\n* ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries\n(CVE-2018-0495)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1591163 - CVE-2018-0495 ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries\n1774831 - CVE-2019-11745 nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate\n\n6. Package List:\n\nRed Hat Enterprise Linux ComputeNode EUS (v. 7.5):\n\nSource:\nnss-softokn-3.36.0-6.el7_5.src.rpm\n\nx86_64:\nnss-softokn-3.36.0-6.el7_5.i686.rpm\nnss-softokn-3.36.0-6.el7_5.x86_64.rpm\nnss-softokn-debuginfo-3.36.0-6.el7_5.i686.rpm\nnss-softokn-debuginfo-3.36.0-6.el7_5.x86_64.rpm\nnss-softokn-freebl-3.36.0-6.el7_5.i686.rpm\nnss-softokn-freebl-3.36.0-6.el7_5.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5):\n\nx86_64:\nnss-softokn-debuginfo-3.36.0-6.el7_5.i686.rpm\nnss-softokn-debuginfo-3.36.0-6.el7_5.x86_64.rpm\nnss-softokn-devel-3.36.0-6.el7_5.i686.rpm\nnss-softokn-devel-3.36.0-6.el7_5.x86_64.rpm\nnss-softokn-freebl-devel-3.36.0-6.el7_5.i686.rpm\nnss-softokn-freebl-devel-3.36.0-6.el7_5.x86_64.rpm\n\nRed Hat Enterprise Linux Server EUS (v. 7.5):\n\nSource:\nnss-softokn-3.36.0-6.el7_5.src.rpm\n\nppc64:\nnss-softokn-3.36.0-6.el7_5.ppc.rpm\nnss-softokn-3.36.0-6.el7_5.ppc64.rpm\nnss-softokn-debuginfo-3.36.0-6.el7_5.ppc.rpm\nnss-softokn-debuginfo-3.36.0-6.el7_5.ppc64.rpm\nnss-softokn-devel-3.36.0-6.el7_5.ppc.rpm\nnss-softokn-devel-3.36.0-6.el7_5.ppc64.rpm\nnss-softokn-freebl-3.36.0-6.el7_5.ppc.rpm\nnss-softokn-freebl-3.36.0-6.el7_5.ppc64.rpm\nnss-softokn-freebl-devel-3.36.0-6.el7_5.ppc.rpm\nnss-softokn-freebl-devel-3.36.0-6.el7_5.ppc64.rpm\n\nppc64le:\nnss-softokn-3.36.0-6.el7_5.ppc64le.rpm\nnss-softokn-debuginfo-3.36.0-6.el7_5.ppc64le.rpm\nnss-softokn-devel-3.36.0-6.el7_5.ppc64le.rpm\nnss-softokn-freebl-3.36.0-6.el7_5.ppc64le.rpm\nnss-softokn-freebl-devel-3.36.0-6.el7_5.ppc64le.rpm\n\ns390x:\nnss-softokn-3.36.0-6.el7_5.s390.rpm\nnss-softokn-3.36.0-6.el7_5.s390x.rpm\nnss-softokn-debuginfo-3.36.0-6.el7_5.s390.rpm\nnss-softokn-debuginfo-3.36.0-6.el7_5.s390x.rpm\nnss-softokn-devel-3.36.0-6.el7_5.s390.rpm\nnss-softokn-devel-3.36.0-6.el7_5.s390x.rpm\nnss-softokn-freebl-3.36.0-6.el7_5.s390.rpm\nnss-softokn-freebl-3.36.0-6.el7_5.s390x.rpm\nnss-softokn-freebl-devel-3.36.0-6.el7_5.s390.rpm\nnss-softokn-freebl-devel-3.36.0-6.el7_5.s390x.rpm\n\nx86_64:\nnss-softokn-3.36.0-6.el7_5.i686.rpm\nnss-softokn-3.36.0-6.el7_5.x86_64.rpm\nnss-softokn-debuginfo-3.36.0-6.el7_5.i686.rpm\nnss-softokn-debuginfo-3.36.0-6.el7_5.x86_64.rpm\nnss-softokn-devel-3.36.0-6.el7_5.i686.rpm\nnss-softokn-devel-3.36.0-6.el7_5.x86_64.rpm\nnss-softokn-freebl-3.36.0-6.el7_5.i686.rpm\nnss-softokn-freebl-3.36.0-6.el7_5.x86_64.rpm\nnss-softokn-freebl-devel-3.36.0-6.el7_5.i686.rpm\nnss-softokn-freebl-devel-3.36.0-6.el7_5.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2018-0495\nhttps://access.redhat.com/security/cve/CVE-2019-11745\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2020 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nrIqDkBJPd4A=xNcH\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nBackground\n==========\n\nThe Mozilla Network Security Service (NSS) is a library implementing\nsecurity features like SSL v.2/v.3, TLS, PKCS #5, PKCS #7, PKCS #11,\nPKCS #12, S/MIME and X.509 certificates. 7.4) - x86_64\n\n3. ==========================================================================\nUbuntu Security Notice USN-4241-1\nJanuary 16, 2020\n\nthunderbird vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 19.10\n- Ubuntu 18.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in Thunderbird. \n(CVE-2019-17005, CVE-2019-17008, CVE-2019-17010, CVE-2019-17011,\nCVE-2019-17012, CVE-2019-17016, CVE-2019-17017, CVE-2019-17022,\nCVE-2019-17024, CVE-2019-17026)\n\nIt was discovered that NSS incorrectly handled certain memory operations. (CVE-2019-11745)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 19.10:\n  thunderbird                     1:68.4.1+build1-0ubuntu0.19.10.1\n\nUbuntu 18.04 LTS:\n  thunderbird                     1:68.4.1+build1-0ubuntu0.18.04.1\n\nAfter a standard system update you need to restart Thunderbird to make\nall the necessary changes. 8.0) - ppc64le, x86_64\n\n3. Description:\n\nNetwork Security Services (NSS) is a set of libraries designed to support\nthe cross-platform development of security-enabled client and server\napplications. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 202003-10\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                           https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n    Title: Mozilla Thunderbird: Multiple vulnerabilities\n     Date: March 14, 2020\n     Bugs: #698516, #702638, #709350, #712518\n       ID: 202003-10\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Mozilla Thunderbird, the\nworst of which could result in the arbitrary execution of code. \n\nBackground\n==========\n\nMozilla Thunderbird is a popular open-source email client from the\nMozilla project. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package              /     Vulnerable     /            Unaffected\n    -------------------------------------------------------------------\n  1  mail-client/thunderbird      \u003c 68.6.0                  \u003e= 68.6.0\n  2  mail-client/thunderbird-bin\n                                  \u003c 68.6.0                  \u003e= 68.6.0\n    -------------------------------------------------------------------\n     2 affected packages\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Mozilla Thunderbird. \nPlease review the CVE identifiers referenced below for details. \n\nImpact\n======\n\nA remote attacker may be able to execute arbitrary code, cause a Denial\nof Service condition, obtain sensitive information, or conduct\nCross-Site Request Forgery (CSRF). \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Mozilla Thunderbird users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \"\u003e=mail-client/thunderbird-68.6.0\"\n\nAll Mozilla Thunderbird binary users should upgrade to the latest\nversion:\n\n  # emerge --sync\n  # emerge --ask --oneshot -v \"\u003e=mail-client/thunderbird-bin-68.6.0\"\n\nReferences\n==========\n\n[  1 ] MFSA-2019-35\n       https://www.mozilla.org/en-US/security/advisories/mfsa2019-35/\n[  2 ] MFSA-2019-37\n       https://www.mozilla.org/en-US/security/advisories/mfsa2019-37/\n[  3 ] MFSA-2020-07\n       https://www.mozilla.org/en-US/security/advisories/mfsa2020-07/\n[  4 ] MFSA-2020-10\n       https://www.mozilla.org/en-US/security/advisories/mfsa2020-10/\n[  5 ] CVE-2019-11745\n       https://nvd.nist.gov/vuln/detail/CVE-2019-11745\n[  6 ] CVE-2019-11757\n       https://nvd.nist.gov/vuln/detail/CVE-2019-11757\n[  7 ] CVE-2019-11759\n       https://nvd.nist.gov/vuln/detail/CVE-2019-11759\n[  8 ] CVE-2019-11760\n       https://nvd.nist.gov/vuln/detail/CVE-2019-11760\n[  9 ] CVE-2019-11761\n       https://nvd.nist.gov/vuln/detail/CVE-2019-11761\n[ 10 ] CVE-2019-11762\n       https://nvd.nist.gov/vuln/detail/CVE-2019-11762\n[ 11 ] CVE-2019-11763\n       https://nvd.nist.gov/vuln/detail/CVE-2019-11763\n[ 12 ] CVE-2019-11764\n       https://nvd.nist.gov/vuln/detail/CVE-2019-11764\n[ 13 ] CVE-2019-17005\n       https://nvd.nist.gov/vuln/detail/CVE-2019-17005\n[ 14 ] CVE-2019-17008\n       https://nvd.nist.gov/vuln/detail/CVE-2019-17008\n[ 15 ] CVE-2019-17010\n       https://nvd.nist.gov/vuln/detail/CVE-2019-17010\n[ 16 ] CVE-2019-17011\n       https://nvd.nist.gov/vuln/detail/CVE-2019-17011\n[ 17 ] CVE-2019-17012\n       https://nvd.nist.gov/vuln/detail/CVE-2019-17012\n[ 18 ] CVE-2019-20503\n       https://nvd.nist.gov/vuln/detail/CVE-2019-20503\n[ 19 ] CVE-2020-6792\n       https://nvd.nist.gov/vuln/detail/CVE-2020-6792\n[ 20 ] CVE-2020-6793\n       https://nvd.nist.gov/vuln/detail/CVE-2020-6793\n[ 21 ] CVE-2020-6794\n       https://nvd.nist.gov/vuln/detail/CVE-2020-6794\n[ 22 ] CVE-2020-6795\n       https://nvd.nist.gov/vuln/detail/CVE-2020-6795\n[ 23 ] CVE-2020-6798\n       https://nvd.nist.gov/vuln/detail/CVE-2020-6798\n[ 24 ] CVE-2020-6800\n       https://nvd.nist.gov/vuln/detail/CVE-2020-6800\n[ 25 ] CVE-2020-6805\n       https://nvd.nist.gov/vuln/detail/CVE-2020-6805\n[ 26 ] CVE-2020-6806\n       https://nvd.nist.gov/vuln/detail/CVE-2020-6806\n[ 27 ] CVE-2020-6807\n       https://nvd.nist.gov/vuln/detail/CVE-2020-6807\n[ 28 ] CVE-2020-6811\n       https://nvd.nist.gov/vuln/detail/CVE-2020-6811\n[ 29 ] CVE-2020-6812\n       https://nvd.nist.gov/vuln/detail/CVE-2020-6812\n[ 30 ] CVE-2020-6814\n       https://nvd.nist.gov/vuln/detail/CVE-2020-6814\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202003-10\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2020 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-11745"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-013984"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-11745"
      },
      {
        "db": "PACKETSTORM",
        "id": "157044"
      },
      {
        "db": "PACKETSTORM",
        "id": "156770"
      },
      {
        "db": "PACKETSTORM",
        "id": "157142"
      },
      {
        "db": "PACKETSTORM",
        "id": "156299"
      },
      {
        "db": "PACKETSTORM",
        "id": "155989"
      },
      {
        "db": "PACKETSTORM",
        "id": "156093"
      },
      {
        "db": "PACKETSTORM",
        "id": "156721"
      },
      {
        "db": "PACKETSTORM",
        "id": "155603"
      }
    ],
    "trust": 2.43
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-11745",
        "trust": 2.7
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-21-040-04",
        "trust": 1.1
      },
      {
        "db": "SIEMENS",
        "id": "SSA-379803",
        "trust": 1.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-013984",
        "trust": 0.8
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-11745",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "157044",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "156770",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "157142",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "156299",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "155989",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "156093",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "156721",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "155603",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2019-11745"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-013984"
      },
      {
        "db": "PACKETSTORM",
        "id": "157044"
      },
      {
        "db": "PACKETSTORM",
        "id": "156770"
      },
      {
        "db": "PACKETSTORM",
        "id": "157142"
      },
      {
        "db": "PACKETSTORM",
        "id": "156299"
      },
      {
        "db": "PACKETSTORM",
        "id": "155989"
      },
      {
        "db": "PACKETSTORM",
        "id": "156093"
      },
      {
        "db": "PACKETSTORM",
        "id": "156721"
      },
      {
        "db": "PACKETSTORM",
        "id": "155603"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-11745"
      }
    ]
  },
  "id": "VAR-202001-1433",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.52540106
  },
  "last_update_date": "2024-09-19T19:37:33.662000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "MFSA2019-36",
        "trust": 0.8,
        "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/"
      },
      {
        "title": "MFSA2019-37",
        "trust": 0.8,
        "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-37/"
      },
      {
        "title": "MFSA2019-38",
        "trust": 0.8,
        "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-38/"
      },
      {
        "title": "openSUSE-SU-2020:0008-1",
        "trust": 0.8,
        "url": "https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html"
      },
      {
        "title": "openSUSE-SU-2020:0003-1",
        "trust": 0.8,
        "url": "https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html"
      },
      {
        "title": "openSUSE-SU-2020:0002-1",
        "trust": 0.8,
        "url": "https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html"
      },
      {
        "title": "Red Hat: Important: nss security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20200243 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: nss-softokn security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20201461 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: nss security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20194114 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: nss-softokn security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20200466 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: nss-softokn security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20194152 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: nss, nss-softokn, nss-util security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20194190 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: nss-softokn security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20201345 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: nss-softokn security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20201267 - Security Advisory"
      },
      {
        "title": "Ubuntu Security Notice: nss vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4203-2"
      },
      {
        "title": "Ubuntu Security Notice: nss vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4203-1"
      },
      {
        "title": "Debian Security Advisories: DSA-4579-1 nss -- security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=0af759a984821af0886871e7a26a298e"
      },
      {
        "title": "Arch Linux Issues: ",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2019-11745 log"
      },
      {
        "title": "Amazon Linux 2: ALAS2-2020-1379",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2020-1379"
      },
      {
        "title": "IBM: Security Bulletin: Vulnerability in nss, nss-softokn, nss-util vulnerability (CVE-2019-11729 and CVE-2019-11745)",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=74fd642ff4a4659039a762a5a0a24106"
      },
      {
        "title": "Amazon Linux 2: ALAS2-2023-1942",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2023-1942"
      },
      {
        "title": "Amazon Linux 2: ALAS2-2020-1384",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2020-1384"
      },
      {
        "title": "Amazon Linux AMI: ALAS-2020-1355",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2020-1355"
      },
      {
        "title": "Ubuntu Security Notice: firefox vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4216-1"
      },
      {
        "title": "Arch Linux Advisories: [ASA-201912-2] thunderbird: arbitrary code execution",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201912-2"
      },
      {
        "title": "Ubuntu Security Notice: firefox vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4216-2"
      },
      {
        "title": "Ubuntu Security Notice: thunderbird vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4241-1"
      },
      {
        "title": "Mozilla: Security Vulnerabilities fixed in - Firefox ESR 68.3",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories\u0026qid=940e53f5eecee1395e2713b0ed07506b"
      },
      {
        "title": "Mozilla: Security Vulnerabilities fixed in - Thunderbird 68.3",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories\u0026qid=dffa374fab03b4f5b5596346629ccc8c"
      },
      {
        "title": "Arch Linux Advisories: [ASA-201912-1] firefox: multiple issues",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201912-1"
      },
      {
        "title": "Siemens Security Advisories: Siemens Security Advisory",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=409c1cd1b8ef401020956950fd839000"
      },
      {
        "title": "Mozilla: Security Vulnerabilities fixed in - Firefox 71",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories\u0026qid=a8e439d387c58595bbdb24cc3bdadd40"
      },
      {
        "title": "Ubuntu Security Notice: thunderbird vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4335-1"
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/vincent-deng/veracode-container-security-finding-parser "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2019-11745"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-013984"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-013984"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-11745"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.6,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11745"
      },
      {
        "trust": 1.3,
        "url": "https://access.redhat.com/errata/rhsa-2020:0243"
      },
      {
        "trust": 1.2,
        "url": "https://access.redhat.com/errata/rhsa-2020:0466"
      },
      {
        "trust": 1.2,
        "url": "https://security.gentoo.org/glsa/202003-10"
      },
      {
        "trust": 1.2,
        "url": "https://security.gentoo.org/glsa/202003-37"
      },
      {
        "trust": 1.1,
        "url": "https://www.mozilla.org/security/advisories/mfsa2019-38/"
      },
      {
        "trust": 1.1,
        "url": "https://www.mozilla.org/security/advisories/mfsa2019-37/"
      },
      {
        "trust": 1.1,
        "url": "https://www.mozilla.org/security/advisories/mfsa2019-36/"
      },
      {
        "trust": 1.1,
        "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1586176"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html"
      },
      {
        "trust": 1.1,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html"
      },
      {
        "trust": 1.1,
        "url": "https://usn.ubuntu.com/4241-1/"
      },
      {
        "trust": 1.1,
        "url": "https://security.gentoo.org/glsa/202003-02"
      },
      {
        "trust": 1.1,
        "url": "https://usn.ubuntu.com/4335-1/"
      },
      {
        "trust": 1.1,
        "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html"
      },
      {
        "trust": 1.1,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf"
      },
      {
        "trust": 1.1,
        "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11745"
      },
      {
        "trust": 0.4,
        "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.4,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2019-11745"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0495"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2018-0495"
      },
      {
        "trust": 0.2,
        "url": "https://bugs.gentoo.org."
      },
      {
        "trust": 0.2,
        "url": "https://creativecommons.org/licenses/by-sa/2.5"
      },
      {
        "trust": 0.2,
        "url": "https://security.gentoo.org/"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17011"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17012"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17010"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/787.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/4203-2/"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/4203-1/"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2020:1267"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-11696"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-11695"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-18508"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-11697"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-11698"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2020:1345"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/thunderbird/1:68.4.1+build1-0ubuntu0.18.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17016"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/4241-1"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17026"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/thunderbird/1:68.4.1+build1-0ubuntu0.19.10.1"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17022"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17024"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17008"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6814"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6798"
      },
      {
        "trust": 0.1,
        "url": "https://www.mozilla.org/en-us/security/advisories/mfsa2019-35/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6795"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6805"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6800"
      },
      {
        "trust": 0.1,
        "url": "https://www.mozilla.org/en-us/security/advisories/mfsa2020-07/"
      },
      {
        "trust": 0.1,
        "url": "https://www.mozilla.org/en-us/security/advisories/mfsa2019-37/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11761"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11757"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11764"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11762"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6794"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6793"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6806"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20503"
      },
      {
        "trust": 0.1,
        "url": "https://www.mozilla.org/en-us/security/advisories/mfsa2020-10/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11759"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6811"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6792"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6807"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6812"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17005"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11760"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11763"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/firefox/71.0+build5-0ubuntu0.18.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17014"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/firefox/71.0+build5-0ubuntu0.19.10.1"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/4216-1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/firefox/71.0+build5-0ubuntu0.19.04.1"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2019-11745"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-013984"
      },
      {
        "db": "PACKETSTORM",
        "id": "157044"
      },
      {
        "db": "PACKETSTORM",
        "id": "156770"
      },
      {
        "db": "PACKETSTORM",
        "id": "157142"
      },
      {
        "db": "PACKETSTORM",
        "id": "156299"
      },
      {
        "db": "PACKETSTORM",
        "id": "155989"
      },
      {
        "db": "PACKETSTORM",
        "id": "156093"
      },
      {
        "db": "PACKETSTORM",
        "id": "156721"
      },
      {
        "db": "PACKETSTORM",
        "id": "155603"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-11745"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULMON",
        "id": "CVE-2019-11745"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-013984"
      },
      {
        "db": "PACKETSTORM",
        "id": "157044"
      },
      {
        "db": "PACKETSTORM",
        "id": "156770"
      },
      {
        "db": "PACKETSTORM",
        "id": "157142"
      },
      {
        "db": "PACKETSTORM",
        "id": "156299"
      },
      {
        "db": "PACKETSTORM",
        "id": "155989"
      },
      {
        "db": "PACKETSTORM",
        "id": "156093"
      },
      {
        "db": "PACKETSTORM",
        "id": "156721"
      },
      {
        "db": "PACKETSTORM",
        "id": "155603"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-11745"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-01-08T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-11745"
      },
      {
        "date": "2020-01-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-013984"
      },
      {
        "date": "2020-04-01T15:23:37",
        "db": "PACKETSTORM",
        "id": "157044"
      },
      {
        "date": "2020-03-16T22:35:27",
        "db": "PACKETSTORM",
        "id": "156770"
      },
      {
        "date": "2020-04-07T16:41:47",
        "db": "PACKETSTORM",
        "id": "157142"
      },
      {
        "date": "2020-02-11T15:56:55",
        "db": "PACKETSTORM",
        "id": "156299"
      },
      {
        "date": "2020-01-17T16:38:14",
        "db": "PACKETSTORM",
        "id": "155989"
      },
      {
        "date": "2020-01-27T22:53:39",
        "db": "PACKETSTORM",
        "id": "156093"
      },
      {
        "date": "2020-03-14T17:08:25",
        "db": "PACKETSTORM",
        "id": "156721"
      },
      {
        "date": "2019-12-09T23:42:22",
        "db": "PACKETSTORM",
        "id": "155603"
      },
      {
        "date": "2020-01-08T20:15:12.313000",
        "db": "NVD",
        "id": "CVE-2019-11745"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-02-19T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-11745"
      },
      {
        "date": "2020-01-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-013984"
      },
      {
        "date": "2021-02-19T17:22:17.650000",
        "db": "NVD",
        "id": "CVE-2019-11745"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "155989"
      }
    ],
    "trust": 0.1
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Firefox and  Thunderbird Vulnerable to out-of-bounds writing",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-013984"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "arbitrary",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "156721"
      },
      {
        "db": "PACKETSTORM",
        "id": "155603"
      }
    ],
    "trust": 0.2
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.