Description
Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1874-1 | New nss packages fix several vulnerabilities |
Debian DSA |
DSA-2025-1 | New icedove packages fix several vulnerabilities |
Ubuntu USN |
USN-810-1 | NSS vulnerabilities |
References
History
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Mozilla
Subscribe
Firefox
Subscribe
Network Security Services
Subscribe
Seamonkey
Subscribe
Thunderbird
Subscribe
Opensuse
Subscribe
Opensuse
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Rhel Eus
Subscribe
Suse
Subscribe
Linux Enterprise
Subscribe
Linux Enterprise Server
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T05:52:14.734Z
Reserved: 2009-07-09T00:00:00.000Z
Link: CVE-2009-2408
No data.
Status : Deferred
Published: 2009-07-30T19:30:00.313
Modified: 2025-04-09T00:30:58.490
Link: CVE-2009-2408
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN