Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-3170

Опубликовано: 21 окт. 2010
Источник: ubuntu
Приоритет: low
CVSS2: 4.3

Описание

Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

hardy

not-affected

jaunty

not-affected

karmic

not-affected

lucid

not-affected

maverick

not-affected

upstream

released

4.8.6

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

released

3.12.8-0ubuntu0.10.10.1
hardy

released

3.12.8-0ubuntu0.8.04.1
jaunty

released

3.12.8-0ubuntu0.9.04.1
karmic

released

3.12.8-0ubuntu0.9.10.1
lucid

released

3.12.8-0ubuntu0.10.04.1
maverick

released

3.12.8-0ubuntu0.10.10.1
upstream

released

3.12.8

Показывать по

4.3 Medium

CVSS2

Связанные уязвимости

redhat
около 15 лет назад

Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

nvd
почти 15 лет назад

Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

debian
почти 15 лет назад

Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird bef ...

github
около 3 лет назад

Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

oracle-oval
больше 14 лет назад

ELSA-2010-0862: nss security update (LOW)

4.3 Medium

CVSS2