Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subjects Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firefox | Mozilla | 3.6 (including) | 3.6 (including) |
Firefox | Mozilla | 3.6.2 (including) | 3.6.2 (including) |
Firefox | Mozilla | 3.6.3 (including) | 3.6.3 (including) |
Firefox | Mozilla | 3.6.4 (including) | 3.6.4 (including) |
Firefox | Mozilla | 3.6.6 (including) | 3.6.6 (including) |
Firefox | Mozilla | 3.6.7 (including) | 3.6.7 (including) |
Firefox | Mozilla | 3.6.8 (including) | 3.6.8 (including) |
Firefox | Mozilla | 3.6.9 (including) | 3.6.9 (including) |
Firefox | Mozilla | 3.6.10 (including) | 3.6.10 (including) |
Red Hat Enterprise Linux 3 | RedHat | seamonkey-0:1.0.9-0.61.el3 | * |
Red Hat Enterprise Linux 4 | RedHat | seamonkey-0:1.0.9-64.el4 | * |
Red Hat Enterprise Linux 4 | RedHat | firefox-0:3.6.11-2.el4 | * |
Red Hat Enterprise Linux 4 | RedHat | nss-0:3.12.8-1.el4 | * |
Red Hat Enterprise Linux 5 | RedHat | firefox-0:3.6.11-2.el5 | * |
Red Hat Enterprise Linux 5 | RedHat | nss-0:3.12.8-1.el5 | * |
Red Hat Enterprise Linux 5 | RedHat | xulrunner-0:1.9.2.11-2.el5 | * |
Red Hat Enterprise Linux 6 | RedHat | nss-0:3.12.8-1.el6_0 | * |
Red Hat Enterprise Linux 6 | RedHat | nss-softokn-0:3.12.8-1.el6_0 | * |
Red Hat Enterprise Linux 6 | RedHat | nss-util-0:3.12.8-1.el6_0 | * |
Nspr | Ubuntu | upstream | * |
Nss | Ubuntu | devel | * |
Nss | Ubuntu | hardy | * |
Nss | Ubuntu | jaunty | * |
Nss | Ubuntu | karmic | * |
Nss | Ubuntu | lucid | * |
Nss | Ubuntu | maverick | * |
Nss | Ubuntu | upstream | * |