In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.14.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.14.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.14.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.14.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.14.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.14.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.14.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.14.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.46"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-17006.json"