Описание
Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | not-affected | |
hardy | not-affected | |
jaunty | not-affected | |
karmic | not-affected | |
lucid | not-affected | |
maverick | not-affected | |
upstream | released | 4.8.6 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | released | 3.12.8-0ubuntu0.10.10.1 |
hardy | released | 3.12.8-0ubuntu0.8.04.1 |
jaunty | released | 3.12.8-0ubuntu0.9.04.1 |
karmic | released | 3.12.8-0ubuntu0.9.10.1 |
lucid | released | 3.12.8-0ubuntu0.10.04.1 |
maverick | released | 3.12.8-0ubuntu0.10.10.1 |
upstream | released | 3.12.8 |
Показывать по
EPSS
4.3 Medium
CVSS2
Связанные уязвимости
Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird bef ...
Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
EPSS
4.3 Medium
CVSS2