Уязвимость некорректной обработки символа '\0' в доменном имени в поле общего имени (CN) X.509 сертификата в Mozilla Network Security Services, Firefox, Thunderbird и SeaMonkey
Описание
В Mozilla Network Security Services (NSS) до версии 3.12.3, Firefox до версии 3.0.13, Thunderbird до версии 2.0.0.23 и SeaMonkey до версии 1.1.18 некорректно обрабатывается символ '\0' в доменном имени в поле общего имени (CN) X.509 сертификата. Это позволяет злоумышленникам путем атаки "человек посередине" (man-in-the-middle) подменять произвольные SSL-серверы с помощью специально сформированного сертификата, выданного законным центром сертификации.
Затронутые версии ПО
- Mozilla Network Security Services (NSS) до версии 3.12.3
- Firefox до версии 3.0.13
- Thunderbird до версии 2.0.0.23
- SeaMonkey до версии 1.1.18
Тип уязвимости
Подмена SSL-серверов (спуфинг) с использованием сертификатов
Ссылки
- Broken Link
- Mailing List
- Mailing List
- Broken Link
- Broken LinkVendor Advisory
- Broken LinkVendor Advisory
- Broken LinkVendor Advisory
- Broken LinkVendor Advisory
- Broken LinkVendor Advisory
- Broken Link
- Broken Link
- Broken Link
- Mailing List
- Broken Link
- Broken Link
- Broken Link
- Vendor Advisory
- Broken Link
- Broken Link
- Broken Link
Уязвимые конфигурации
Одно из
Одно из
Одно из
EPSS
5.9 Medium
CVSS3
6.8 Medium
CVSS2
Дефекты
Связанные уязвимости
Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
Mozilla Network Security Services (NSS) before 3.12.3, Firefox before ...
Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
ELSA-2009-1186: nspr and nss security, bug fix, and enhancement update (CRITICAL)
EPSS
5.9 Medium
CVSS3
6.8 Medium
CVSS2