National Cyber-Alert System
Vulnerability Summary for CVE-2009-2404
Original release date:08/03/2009
Last revised:08/15/2009
Source:
US-CERT/NIST
Overview
Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.
Impact
CVSS Severity (version 2.0):
Impact Subscore:
10.0
Exploitability Subscore:
8.6
CVSS Version 2 Metrics:
Access Vector: Network exploitable; Victim must voluntarily interact with attack mechanism
Access Complexity: Medium
Authentication: Not required to exploit
Impact Type:Provides administrator access, Allows complete confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.
External Source: VUPEN
Name: ADV-2009-2085
Type: Advisory; Patch Information
External Source: BID
Name: 35891
Type: Patch Information
External Source: CONFIRM
Name: http://www.mozilla.org/security/announce/2009/mfsa2009-43.html
Type: Advisory; Patch Information
External Source: CONFIRM
Name: https://bugzilla.redhat.com/show_bug.cgi?id=512912
External Source: UBUNTU
Name: USN-810-2
External Source: UBUNTU
Name: USN-810-1
External Source: REDHAT
Name: RHSA-2009:1207
External Source: MANDRIVA
Name: MDVSA-2009:197
External Source: MISC
Name: http://www.blackhat.com/presentations/bh-usa-09/MARLINSPIKE/BHUSA09-Marlinspike-DefeatSSL-SLIDES.pdf
External Source: SECUNIA
Name: 36157
Type: Advisory
External Source: SECUNIA
Name: 36139
Type: Advisory
External Source: SECUNIA
Name: 36125
Type: Advisory
External Source: SECUNIA
Name: 36102
Type: Advisory
External Source: SECUNIA
Name: 36088
Type: Advisory
External Source: REDHAT
Name: RHSA-2009:1185