Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-2809

Опубликовано: 08 июл. 2008
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4

Описание

Mozilla 1.9 M8 and earlier, Mozilla Firefox 2 before 2.0.0.15, SeaMonkey 1.1.5 and other versions before 1.1.10, Netscape 9.0, and other Mozilla-based web browsers, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regard the certificate as also accepted for all domain names in subjectAltName:dNSName fields, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.

РелизСтатусПримечание
dapper

released

1.5.dfsg+1.5.0.15~prepatch080614c-0ubuntu1
devel

not-affected

3.0+nobinonly-0ubuntu0.8.04.1
feisty

released

2.0.0.15+0nobinonly-0ubuntu0.7.4
gutsy

released

2.0.0.15+1nobinonly-0ubuntu0.7.10
hardy

released

2.0.0.15+1nobinonly-0ubuntu0.8.04.2
intrepid

DNE

jaunty

DNE

karmic

DNE

lucid

not-affected

3.0+nobinonly-0ubuntu0.8.04.1
maverick

not-affected

3.0+nobinonly-0ubuntu0.8.04.1

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

feisty

DNE

gutsy

ignored

end of life, was needed
hardy

not-affected

3.0+nobinonly-0ubuntu0.8.04.1
intrepid

not-affected

3.0+nobinonly-0ubuntu2
jaunty

not-affected

3.0+nobinonly-0ubuntu2
karmic

DNE

lucid

DNE

maverick

DNE

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

feisty

DNE

gutsy

ignored

end of life, was needed
hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

DNE

lucid

DNE

maverick

DNE

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

feisty

DNE

gutsy

DNE

hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

DNE

lucid

DNE

maverick

DNE

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

feisty

DNE

gutsy

DNE

hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

DNE

lucid

DNE

maverick

DNE

Показывать по

РелизСтатусПримечание
dapper

released

1.5.0.13+1.5.0.15~prepatch080614d-0ubuntu0.6.06.1
devel

DNE

feisty

released

1.5.0.13+1.5.0.15~prepatch080614d-0ubuntu0.7.04.1
gutsy

DNE

hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

DNE

lucid

DNE

maverick

DNE

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

released

1.1.11+nobinonly-0ubuntu1
feisty

DNE

gutsy

DNE

hardy

released

1.1.12+nobinonly-0ubuntu0.8.04.1
intrepid

released

1.1.11+nobinonly-0ubuntu1
jaunty

released

1.1.11+nobinonly-0ubuntu1
karmic

released

1.1.11+nobinonly-0ubuntu1
lucid

released

1.1.11+nobinonly-0ubuntu1
maverick

released

1.1.11+nobinonly-0ubuntu1

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

released

2.0.0.16+nobinonly-0ubuntu1
feisty

DNE

gutsy

released

2.0.0.16+nobinonly-0ubuntu0.7.10.1
hardy

released

2.0.0.16+nobinonly-0ubuntu0.8.04.1
intrepid

released

2.0.0.16+nobinonly-0ubuntu1
jaunty

released

2.0.0.16+nobinonly-0ubuntu1
karmic

released

2.0.0.16+nobinonly-0ubuntu1
lucid

released

2.0.0.16+nobinonly-0ubuntu1
maverick

released

2.0.0.16+nobinonly-0ubuntu1

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

feisty

ignored

end of life, was needed
gutsy

released

1.8.1.18+nobinonly.b308.cvs20090331t155113-0ubuntu0.7.10.1
hardy

released

1.8.1.18+nobinonly.b308.cvs20090331t155113-0ubuntu0.8.04.1
intrepid

released

1.8.1.18+nobinonly.b308.cvs20090331t155113-0ubuntu0.8.10.1
jaunty

ignored

end of life
karmic

ignored

end of life
lucid

DNE

maverick

DNE

Показывать по

EPSS

Процентиль: 83%
0.01957
Низкий

4 Medium

CVSS2

Связанные уязвимости

redhat
почти 17 лет назад

Mozilla 1.9 M8 and earlier, Mozilla Firefox 2 before 2.0.0.15, SeaMonkey 1.1.5 and other versions before 1.1.10, Netscape 9.0, and other Mozilla-based web browsers, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regard the certificate as also accepted for all domain names in subjectAltName:dNSName fields, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.

nvd
почти 17 лет назад

Mozilla 1.9 M8 and earlier, Mozilla Firefox 2 before 2.0.0.15, SeaMonkey 1.1.5 and other versions before 1.1.10, Netscape 9.0, and other Mozilla-based web browsers, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regard the certificate as also accepted for all domain names in subjectAltName:dNSName fields, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.

debian
почти 17 лет назад

Mozilla 1.9 M8 and earlier, Mozilla Firefox 2 before 2.0.0.15, SeaMonk ...

github
около 3 лет назад

Mozilla 1.9 M8 and earlier, Mozilla Firefox 2 before 2.0.0.15, SeaMonkey 1.1.5 and other versions before 1.1.10, Netscape 9.0, and other Mozilla-based web browsers, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regard the certificate as also accepted for all domain names in subjectAltName:dNSName fields, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.

oracle-oval
почти 17 лет назад

ELSA-2008-0569: firefox security update (CRITICAL)

EPSS

Процентиль: 83%
0.01957
Низкий

4 Medium

CVSS2

Уязвимость CVE-2008-2809