Security News > 2021 > December > Mozilla patches critical “BigSig” cryptographic bug: Here’s how to track it down and fix it

Mozilla patches critical “BigSig” cryptographic bug: Here’s how to track it down and fix it
2021-12-03 19:58

Many software vendors rely on third-party open source cryptographic tools, such as OpenSSL, or simply hook up with the cryptographic libraries built into the operating system itself, such as Microsoft's Secure Channel on Windows or Apple's Secure Transport on macOS and iOS. But Mozilla has always used its own cryptographic library, known as NSS, short for Network Security Services, instead of relying on third-party or system-level code.

The vulnerability is officially known as CVE-2021-43527, but Ormandy has jokingly dubbed it BigSig, because it involves a buffer overflow provoked by submitting a digital signature signed with a cryptographic key that is bigger than the largest key NSS is programmed to expect.

The space reserved for the public key is chosen by working out the size of the largest possible DSA key supported by NSS, the largest possible Elliptic Curve key supported by NSS, and the largest RSA key, and then using the largest of those values to ensure a buffer that is "Always big enough".

RSA keys are notoriously much larger that those of other cryptographic algorithms, typically reaching 2048 or even 4096 bits, instead of the 256 or 512 bits typically required for EC keys.

For advice on how to locate any NSS library files on your computer, and how to check what version you have, see below.

Just because most people won't generate huge cryptographic keys doesn't mean that no one will, whether they do so by accident or by design.


News URL

https://nakedsecurity.sophos.com/2021/12/03/mozilla-patches-exploitable-bigsig-cryptographic-bug/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2021-12-08 CVE-2021-43527 Out-of-bounds Write vulnerability in multiple products
NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures.
network
low complexity
mozilla netapp oracle starwindsoftware CWE-787
critical
9.8

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Mozilla 38 116 1520 562 572 2770