CVE-2009-2408
30.07.2009, 19:30
Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.Enginsight
Vendor | Product | Version |
---|---|---|
mozilla | firefox | 𝑥 < 3.0.13 |
mozilla | network_security_services | 𝑥 < 3.12.3 |
mozilla | seamonkey | 𝑥 < 1.1.18 |
mozilla | thunderbird | 𝑥 < 2.0.0.23 |
opensuse | opensuse | 10.3 ≤ 𝑥 ≤ 11.1 |
suse | linux_enterprise | 10.0 |
suse | linux_enterprise | 11.0 |
debian | debian_linux | 5.0 |
canonical | ubuntu_linux | 8.04 |
canonical | ubuntu_linux | 8.10 |
canonical | ubuntu_linux | 9.04 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||
---|---|---|---|---|---|---|---|---|---|
nss |
| ||||||||
openssl |
| ||||||||
xulrunner |
| ||||||||
xulrunner-1.9 |
| ||||||||
xulrunner-1.9.1 |
|
Common Weakness Enumeration
References