CVE-2017-11698

Published: 27 December 2017

Heap-based buffer overflow in the __get_page function in lib/dbm/src/h_page.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.

Priority

Negligible

CVSS 3 base score: 7.8

Status

Package Release Status
nss
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(2:3.49.1-1ubuntu1)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(2:3.49.1-1ubuntu1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(2:3.49.1-1ubuntu1)
Ubuntu 18.04 LTS (Bionic Beaver) Deferred

Ubuntu 16.04 ESM (Xenial Xerus) Deferred

Ubuntu 14.04 ESM (Trusty Tahr) Deferred

Notes

AuthorNote
mdeslaur
Upstream NSS will not be fixing this issue.
this is an issue in libnssdbm. NSS 3.35 made SQLite the default
datastore. NSS 3.49 stopped building the legacy datastore.

References

Bugs