Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-2404

Опубликовано: 03 авг. 2009
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 9.3

Описание

Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.

РелизСтатусПримечание
dapper

DNE

devel

released

3.12.3.1-0ubuntu1
hardy

released

3.12.3.1-0ubuntu0.8.04.1
intrepid

released

3.12.3.1-0ubuntu0.8.04.1
jaunty

released

3.12.3.1-0ubuntu0.8.04.1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 95%
0.21024
Средний

9.3 Critical

CVSS2

Связанные уязвимости

redhat
почти 16 лет назад

Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.

nvd
почти 16 лет назад

Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.

debian
почти 16 лет назад

Heap-based buffer overflow in a regular-expression parser in Mozilla N ...

github
около 3 лет назад

Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.

oracle-oval
почти 16 лет назад

ELSA-2009-1186: nspr and nss security, bug fix, and enhancement update (CRITICAL)

EPSS

Процентиль: 95%
0.21024
Средний

9.3 Critical

CVSS2