CVE-2013-5606

Impact:
Moderate
Public Date:
2013-11-19
IAVA:
2016-A-0293
Bugzilla:
1031457: CVE-2013-5606 nss: CERT_VerifyCert returns SECSuccess (saying certificate is good) even for bad certificates (MFSA 2013-103)

The MITRE CVE dictionary describes this issue as:

The CERT_VerifyCert function in lib/certhigh/certvfy.c in Mozilla Network Security Services (NSS) 3.15 before 3.15.3 provides an unexpected return value for an incompatible key-usage certificate when the CERTVerifyLog argument is valid, which might allow remote attackers to bypass intended access restrictions via a crafted certificate.

Find out more about CVE-2013-5606 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 4.3
Base Metrics AV:N/AC:M/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (nss) RHSA-2013:1829 2013-12-12
Red Hat Enterprise Linux 5 (nss) RHSA-2013:1791 2013-12-05
RHEV Hypervisor for RHEL-6 (rhev-hypervisor6) RHSA-2014:0041 2014-01-21

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 7 nss Not affected

Acknowledgements

Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Camilo Viecco as the original reporter of this issue.

External References

Last Modified