CVE Vulnerabilities

CVE-2009-2408

Improper Certificate Validation

Published: Jul 30, 2009 | Modified: Apr 09, 2025
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
4.3 IMPORTANT
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a 0 character in a domain name in the subjects Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.

Weakness

The product does not validate, or incorrectly validates, a certificate.

Affected Software

NameVendorStart VersionEnd Version
FirefoxMozilla*3.0.13 (excluding)
Network_security_servicesMozilla*3.12.3 (excluding)
SeamonkeyMozilla*1.1.18 (excluding)
ThunderbirdMozilla*2.0.0.23 (excluding)
Red Hat Enterprise Linux 3RedHatseamonkey-0:1.0.9-0.45.el3*
Red Hat Enterprise Linux 4RedHatnspr-0:4.7.4-1.el4_8.1*
Red Hat Enterprise Linux 4RedHatnss-0:3.12.3.99.3-1.el4_8.2*
Red Hat Enterprise Linux 4.7 Z StreamRedHatnspr-0:4.7.4-1.el4_7.1*
Red Hat Enterprise Linux 4.7 Z StreamRedHatnss-0:3.12.3.99.3-1.el4_7.6*
Red Hat Enterprise Linux 5RedHatnspr-0:4.7.4-1.el5_3.1*
Red Hat Enterprise Linux 5RedHatnss-0:3.12.3.99.3-1.el5_3.2*
Red Hat Enterprise Linux 5.2 Z StreamRedHatnspr-0:4.7.4-1.el5_2*
Red Hat Enterprise Linux 5.2 Z StreamRedHatnss-0:3.12.3.99.3-1.el5_2*
NssUbuntudevel*
NssUbuntuhardy*
NssUbuntuintrepid*
NssUbuntujaunty*
NssUbuntuupstream*

Potential Mitigations

References