You are here: Security Center > Mozilla Foundation Security Advisories > MFSA 2012-39

Mozilla Foundation Security Advisory 2012-39

Title: NSS parsing errors with zero length items
Impact: Moderate
Announced: June 5, 2012
Reporter: Kaspar Brand
Products: Firefox, Thunderbird, SeaMonkey

Fixed in: Firefox 13.0
  Firefox ESR 10.0.5
  Thunderbird 13.0
  Thunderbird ESR 10.0.5
  SeaMonkey 2.10


Security researcher Kaspar Brand found a flaw in how the Network Security Services (NSS) ASN.1 decoder handles zero length items. Effects of this issue depend on the field. One known symptom is an unexploitable crash in handling OCSP responses. NSS also mishandles zero-length basic constraints, assuming default values for some types that should be rejected as malformed. These issues have been addressed in NSS 3.13.4, which is now being used by Mozilla.