CVE-2014-1568

NameCVE-2014-1568
DescriptionMozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a "signature malleability" issue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-62-1, DSA-3033-1, DSA-3034-1, DSA-3037-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
icedove (PTS)jessie1:52.3.0-4~deb8u2fixed
nss (PTS)jessie, jessie (lts)2:3.26-1+debu8u19fixed
stretch (security)2:3.26.2-1.1+deb9u5fixed
stretch (lts), stretch2:3.26.2-1.1+deb9u8fixed
buster, buster (lts)2:3.42.1-1+deb10u9fixed
buster (security)2:3.42.1-1+deb10u8fixed
bullseye2:3.61-1+deb11u3fixed
bullseye (security)2:3.61-1+deb11u4fixed
bookworm2:3.87.1-1fixed
bookworm (security)2:3.87.1-1+deb12u1fixed
sid, trixie2:3.106-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
icedovesourcesqueeze(unfixed)end-of-life
icedovesourcewheezy24.8.1-1~deb7u1DSA-3037-1
icedovesource(unstable)(not affected)
iceweaselsourcesqueeze(unfixed)end-of-life
iceweaselsourcewheezy24.8.1esr-1~deb7u1DSA-3034-1
iceweaselsource(unstable)(not affected)
nsssourcesqueeze3.12.8-1+squeeze9DLA-62-1
nsssourcewheezy2:3.14.5-1+deb7u2DSA-3033-1
nsssource(unstable)2:3.17.1-1

Notes

- iceweasel <not-affected> (uses system nss)
- icedove <not-affected> (uses system nss)
https://www.mozilla.org/security/announce/2014/mfsa2014-73.html
http://www.intelsecurity.com/advanced-threat-research/#

Search for package or bug name: Reporting problems