Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a 0 character in a domain name in the subjects Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
The product does not validate, or incorrectly validates, a certificate.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firefox | Mozilla | * | 3.0.13 (excluding) |
Network_security_services | Mozilla | * | 3.12.3 (excluding) |
Seamonkey | Mozilla | * | 1.1.18 (excluding) |
Thunderbird | Mozilla | * | 2.0.0.23 (excluding) |
Red Hat Enterprise Linux 3 | RedHat | seamonkey-0:1.0.9-0.45.el3 | * |
Red Hat Enterprise Linux 4 | RedHat | nspr-0:4.7.4-1.el4_8.1 | * |
Red Hat Enterprise Linux 4 | RedHat | nss-0:3.12.3.99.3-1.el4_8.2 | * |
Red Hat Enterprise Linux 4.7 Z Stream | RedHat | nspr-0:4.7.4-1.el4_7.1 | * |
Red Hat Enterprise Linux 4.7 Z Stream | RedHat | nss-0:3.12.3.99.3-1.el4_7.6 | * |
Red Hat Enterprise Linux 5 | RedHat | nspr-0:4.7.4-1.el5_3.1 | * |
Red Hat Enterprise Linux 5 | RedHat | nss-0:3.12.3.99.3-1.el5_3.2 | * |
Red Hat Enterprise Linux 5.2 Z Stream | RedHat | nspr-0:4.7.4-1.el5_2 | * |
Red Hat Enterprise Linux 5.2 Z Stream | RedHat | nss-0:3.12.3.99.3-1.el5_2 | * |
Nss | Ubuntu | devel | * |
Nss | Ubuntu | hardy | * |
Nss | Ubuntu | intrepid | * |
Nss | Ubuntu | jaunty | * |
Nss | Ubuntu | upstream | * |