Ubuntu Security Notice (C) 2009-2013 Canonical, Inc. / NASL script (C) 2013 Tenable Network Security, Inc.
The remote Ubuntu host is missing a security-related patch.
USN-810-1 fixed vulnerabilities in NSS. Jozsef Kadlecsik noticed that
the new libraries on amd64 did not correctly set stack memory flags,
and caused applications using NSS (e.g. Firefox) to have an executable
stack. This reduced the effectiveness of some defensive security
protections. This update fixes the problem.
We apologize for the inconvenience.
Moxie Marlinspike discovered that NSS did not properly handle regular
expressions in certificate names. A remote attacker could create a
specially crafted certificate to cause a denial of service (via
application crash) or execute arbitrary code as the user invoking the
Moxie Marlinspike and Dan Kaminsky independently discovered
that NSS did not properly handle certificates with NULL
characters in the certificate name. An attacker could
exploit this to perform a man in the middle attack to view
sensitive information or alter encrypted communications.
Dan Kaminsky discovered NSS would still accept certificates
with MD2 hash signatures. As a result, an attacker could
potentially create a malicious trusted certificate to
impersonate another site. (CVE-2009-2409).
Update the affected libnss3-1d package.
Risk factor :
High / CVSS Base Score : 9.3
Family: Ubuntu Local Security Checks
Nessus Plugin ID: 65117 ()
CVE ID: CVE-2009-2404CVE-2009-2408CVE-2009-2409
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.