CVE-2016-5285

7.5 HIGH

📋 TL;DR

This CVE describes a null pointer dereference vulnerability in Mozilla Network Security Services (NSS) that allows remote attackers to cause denial of service by triggering a crash. It affects systems using vulnerable versions of NSS for cryptographic operations, particularly in SSL/TLS implementations. The vulnerability is exploitable by malicious users who can send specially crafted network traffic.

💻 Affected Systems

Products:
  • Mozilla Network Security Services (NSS)
  • Applications using NSS libraries
  • Firefox (indirectly through NSS)
  • Red Hat Enterprise Linux
  • SUSE Linux Enterprise Server
  • Other Linux distributions with vulnerable NSS packages
Versions: NSS versions before 3.26.2
Operating Systems: Linux distributions using vulnerable NSS packages, Potentially other Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Systems using NSS for SSL/TLS operations are vulnerable when processing malicious network traffic. The vulnerability is in the cryptographic library itself.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption through application crash, potentially affecting availability of SSL/TLS dependent services like web servers, email servers, or VPNs.

🟠

Likely Case

Denial of service through application crash requiring restart of affected services, with potential for repeated attacks causing sustained downtime.

🟢

If Mitigated

Minimal impact if patched; unpatched systems remain vulnerable to DoS attacks but no data compromise or privilege escalation occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires sending specially crafted network traffic to trigger the null pointer dereference. No authentication is needed, making it relatively easy to exploit for DoS purposes.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: NSS 3.26.2 and later

Vendor Advisory: http://rhn.redhat.com/errata/RHSA-2016-2779.html

Restart Required: Yes

Instructions:

1. Update NSS packages using your distribution's package manager. 2. For Red Hat systems: 'yum update nss nss-util nss-sysinit nss-tools'. 3. For SUSE systems: 'zypper update nss'. 4. Restart affected services using NSS libraries.

🔧 Temporary Workarounds

Network filtering

all

Implement network filtering to block malicious traffic patterns that might trigger the vulnerability

Service isolation

all

Isolate vulnerable services behind load balancers or firewalls to limit exposure

🧯 If You Can't Patch

  • Implement strict network access controls to limit which systems can communicate with vulnerable services
  • Monitor for abnormal service crashes and implement automated restart mechanisms

🔍 How to Verify

Check if Vulnerable:

Check NSS version: 'rpm -q nss' (RHEL/CentOS) or 'dpkg -l | grep nss' (Debian/Ubuntu) or 'zypper info nss' (SUSE). If version is earlier than 3.26.2, system is vulnerable.

Check Version:

rpm -q nss --queryformat '%{VERSION}'

Verify Fix Applied:

Verify NSS version is 3.26.2 or later using the same commands, then test SSL/TLS functionality of affected services.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with segmentation faults in NSS-related processes
  • SSL/TLS handshake failures
  • Service restarts without clear cause

Network Indicators:

  • Unusual SSL/TLS traffic patterns
  • Repeated connection attempts to SSL/TLS ports

SIEM Query:

source="*" ("segmentation fault" OR "null pointer" OR "SIGSEGV") AND process="*nss*"

🔗 References

📤 Share & Export