Guest

Preview Tool

Cisco Bug: CSCul13892 - PCA: Multiple Network Security Services (NSS) Vulnerabilities

Last Modified

Jan 30, 2020

Products (2)

  • Cisco Prime Collaboration
  • Cisco Prime Collaboration 10.5

Known Affected Releases

10.5

Description (partial)

Symptoms: 
Cisco Prime Collaboration Manager includes a version of Mozilla Network Security Services that is affected by
the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

CVE-2009-3555: The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet
Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l,
GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products,
and other products, does not properly associate renegotiation handshakes with an existing connection, which
allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions
protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in
a post-renegotiation context, related to a ''plaintext injection'' attack, aka the ''Project Mogul'' issue. This
has been classified by the vendor as having a CVSSv2 score of 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVE-2010-0826: The Free Software Foundation (FSF) Berkeley DB NSS module (aka libnss-db) 2.2.3pre1 reads the
DB_CONFIG file in the current working directory, which allows local users to obtain sensitive information via
a symlink attack involving a setgid or setuid application that uses this module. This has been classified by
the vendor as having a CVSSv2 score of 1.9 (AV:L/AC:M/AU:N/C:P/I:N/A:N)

CVE-2012-0441: The ASN.1 decoder in the QuickDER decoder in Mozilla Network Security Services (NSS) before
3.13.4, as used in Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0,
Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10, allows remote attackers to cause a denial of
service (application crash) via a zero-length item, as demonstrated by (1) a zero-length basic constraint or
(2) a zero-length field in an OCSP response. This has been classified by the vendor as having a CVSSv2 score
of 5.0 (AV:N/AC:L/AU:N/C:N/I:N/A:P)

CVE-2013-0791: The CERT_DecodeCertPackage function in Mozilla Network Security Services (NSS), as used in
Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x
before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to cause a denial of service
(out-of-bounds read and memory corruption) via a crafted certificate. This has been classified by the vendor
as having a CVSSv2 score of 5.0 (AV:N/AC:L/AU:N/C:N/I:N/A:P)

CVE-2013-1620: The TLS implementation in Mozilla Network Security Services (NSS) does not properly consider
timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC
padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via
statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169. This has been
classified by the vendor as having a CVSSv2 score of 4.3 (AV:N/AC:M/AU:N/C:P/I:N/A:N)

This bug was opened to address the potential impact on this product.

Conditions:
Device running version of the software prior to this fix.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.