{"id":"CVE-2016-2834","details":"Mozilla Network Security Services (NSS) before 3.23, as used in Mozilla Firefox before 47.0, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.","modified":"2026-03-12T22:16:40.486953Z","published":"2016-06-13T10:59:15.167Z","related":["SUSE-SU-2016:1691-1","SUSE-SU-2016:1799-1","SUSE-SU-2016:2061-1","SUSE-SU-2017:1175-1","SUSE-SU-2017:1248-1","openSUSE-SU-2024:10071-1","openSUSE-SU-2024:10451-1","openSUSE-SU-2024:14572-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/91072"},{"type":"WEB","url":"https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.23_release_notes"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html"},{"type":"WEB","url":"http://www.securitytracker.com/id/1036057"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2993-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3029-1"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2779.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3688"},{"type":"ADVISORY","url":"http://www.mozilla.org/security/announce/2016/mfsa2016-61.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1206283"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1241034"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1241037"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1221620"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-2834.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"15.10"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"42.1"}]},{"events":[{"introduced":"0"},{"last_affected":"13.1"}]},{"events":[{"introduced":"0"},{"last_affected":"13.2"}]},{"events":[{"introduced":"0"},{"last_affected":"3.22"}]},{"events":[{"introduced":"0"},{"last_affected":"46.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0-sp1"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0-sp1"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0-sp1"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}