{"id":"CVE-2016-1979","details":"Use-after-free vulnerability in the PK11_ImportDERPrivateKeyInfoAndReturnKey function in Mozilla Network Security Services (NSS) before 3.21.1, as used in Mozilla Firefox before 45.0, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted key data with DER encoding.","modified":"2026-03-12T22:15:14.338614Z","published":"2016-03-13T18:59:28.163Z","related":["MGASA-2016-0105","SUSE-SU-2016:0727-1","SUSE-SU-2016:0777-1","SUSE-SU-2016:0909-1","openSUSE-SU-2024:10071-1","openSUSE-SU-2024:10230-1","openSUSE-SU-2024:10451-1","openSUSE-SU-2024:14572-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html"},{"type":"WEB","url":"https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21.1_release_notes"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"type":"WEB","url":"http://www.securitytracker.com/id/1035215"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/84221"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0591.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0684.html"},{"type":"ADVISORY","url":"http://www.mozilla.org/security/announce/2016/mfsa2016-36.html"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2973-1"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"type":"ADVISORY","url":"https://bto.bluecoat.com/security-advisory/sa124"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0685.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3576"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201605-06"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3688"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1185033"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"44.0.2"}]},{"events":[{"introduced":"0"},{"last_affected":"3.21"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-1979.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}