Vulnerability CVE-2019-11745: Information

Description

When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.

Severity: HIGH (8.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Published: Jan. 8, 2020
Modified: Feb. 19, 2021
Error type identifier: CWE-787

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
firefoxsisyphus71.0-alt1127.0-alt1ALT-PU-2019-3239-1242374Fixed
firefoxp1071.0-alt1118.0.2-alt0.p10.1ALT-PU-2019-3239-1242374Fixed
firefoxp972.0.2-alt0.1.p9105.0.1-alt0.c9.1ALT-PU-2020-1617-1245893Fixed
firefoxc10f171.0-alt1112.0.2-alt0.p10.1ALT-PU-2019-3239-1242374Fixed
firefoxc9f272.0.2-alt0.1.p9105.0.1-alt0.c9.1ALT-PU-2020-1617-1245893Fixed
firefoxp1171.0-alt1126.0.1-alt1ALT-PU-2019-3239-1242374Fixed
firefox-esrsisyphus68.3.0-alt1115.11.0-alt1ALT-PU-2019-3237-1242314Fixed
firefox-esrp1068.3.0-alt1115.11.0-alt1ALT-PU-2019-3237-1242314Fixed
firefox-esrp968.3.0-alt2102.11.0-alt0.c9.1ALT-PU-2019-3264-1242427Fixed
firefox-esrp868.3.0-alt0.M80P.168.4.1-alt0.M80P.1ALT-PU-2019-3301-1242994Fixed
firefox-esrc10f168.3.0-alt1115.9.1-alt0.c10.1ALT-PU-2019-3237-1242314Fixed
firefox-esrc9f278.7.1-alt0.1.c9102.12.0-alt0.c9.1ALT-PU-2021-1368-1264611Fixed
firefox-esrp1168.3.0-alt1115.11.0-alt1ALT-PU-2019-3237-1242314Fixed
nsssisyphus3.47.1-alt13.101-alt1ALT-PU-2019-3212-1242129Fixed
nssp103.47.1-alt13.93.0-alt1ALT-PU-2019-3212-1242129Fixed
nssp93.51.0-alt13.86-alt1ALT-PU-2020-1616-1245893Fixed
nssc10f13.47.1-alt13.92.0-alt1ALT-PU-2019-3212-1242129Fixed
nssc9f23.51.0-alt13.98-alt1ALT-PU-2020-1616-1245893Fixed
nssp113.47.1-alt13.100-alt1ALT-PU-2019-3212-1242129Fixed
thunderbirdsisyphus68.4.2-alt1115.9.0-alt1ALT-PU-2020-1166-1243898Fixed
thunderbirdp1068.4.2-alt1115.9.0-alt1ALT-PU-2020-1166-1243898Fixed
thunderbirdp968.6.0-alt1102.11.0-alt0.c9.1ALT-PU-2020-1515-1245787Fixed
thunderbirdc10f168.4.2-alt1115.9.0-alt0.c10.1ALT-PU-2020-1166-1243898Fixed
thunderbirdc9f268.6.0-alt1102.11.0-alt0.c9.1ALT-PU-2020-1515-1245787Fixed
thunderbirdp1168.4.2-alt1115.9.0-alt1ALT-PU-2020-1166-1243898Fixed

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://www.mozilla.org/security/advisories/mfsa2019-38/
  • Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2019-37/
  • Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2019-36/
  • Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1586176
  • Issue Tracking
  • Patch
  • Vendor Advisory
openSUSE-SU-2020:0002
  • Issue Tracking
  • Mailing List
  • Third Party Advisory
openSUSE-SU-2020:0003
  • Mailing List
  • Third Party Advisory
openSUSE-SU-2020:0008
  • Mailing List
  • Third Party Advisory
USN-4241-1
  • Third Party Advisory
RHSA-2020:0243
  • Third Party Advisory
RHSA-2020:0466
  • Third Party Advisory
GLSA-202003-02
  • Third Party Advisory
GLSA-202003-10
  • Third Party Advisory
GLSA-202003-37
  • Third Party Advisory
USN-4335-1
  • Third Party Advisory
[debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
  • Mailing List
  • Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
  • Third Party Advisory
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
  • Third Party Advisory
  • US Government Resource
    1. Configuration 1

      cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
      End excliding
      71.0

      cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
      End excliding
      68.3

      cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
      End excliding
      68.3.0

      Configuration 2

      cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

      Configuration 3

      cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*

      Configuration 4

      cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

      Configuration 5

      cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*

      Configuration 6

      cpe:2.3:o:siemens:ruggedcom_rox_mx5000_firmware:*:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:h:siemens:ruggedcom_rox_mx5000:-:*:*:*:*:*:*:*

      Configuration 7

      cpe:2.3:o:siemens:ruggedcom_rox_rx1400_firmware:*:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:h:siemens:ruggedcom_rox_rx1400:-:*:*:*:*:*:*:*

      Configuration 8

      cpe:2.3:o:siemens:ruggedcom_rox_rx1500_firmware:*:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:h:siemens:ruggedcom_rox_rx1500:-:*:*:*:*:*:*:*

      Configuration 9

      cpe:2.3:o:siemens:ruggedcom_rox_rx1501_firmware:*:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:h:siemens:ruggedcom_rox_rx1501:-:*:*:*:*:*:*:*

      Configuration 10

      cpe:2.3:o:siemens:ruggedcom_rox_rx1510_firmware:*:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:h:siemens:ruggedcom_rox_rx1510:-:*:*:*:*:*:*:*

      Configuration 11

      cpe:2.3:o:siemens:ruggedcom_rox_rx1511_firmware:*:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:h:siemens:ruggedcom_rox_rx1511:-:*:*:*:*:*:*:*

      Configuration 12

      cpe:2.3:o:siemens:ruggedcom_rox_rx1512_firmware:*:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:h:siemens:ruggedcom_rox_rx1512:-:*:*:*:*:*:*:*

      Configuration 13

      cpe:2.3:o:siemens:ruggedcom_rox_rx5000_firmware:*:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:h:siemens:ruggedcom_rox_rx5000:-:*:*:*:*:*:*:*