Ubuntu Security Notice (C) 2009-2013 Canonical, Inc. / NASL script (C) 2013 Tenable Network Security, Inc.
The remote Ubuntu host is missing a security-related patch.
USN-810-1 fixed vulnerabilities in NSS. Jozsef Kadlecsik noticed that
the new libraries on amd64 did not correctly set stack memory flags,
and caused applications using NSS (e.g. Firefox) to have an executable
stack. This reduced the effectiveness of some defensive security
protections. This update fixes the problem.
We apologize for the inconvenience.
Moxie Marlinspike discovered that NSS did not properly handle regular
expressions in certificate names. A remote attacker could create a
specially crafted certificate to cause a denial of service (via
application crash) or execute arbitrary code as the user invoking the
Moxie Marlinspike and Dan Kaminsky independently discovered
that NSS did not properly handle certificates with NULL
characters in the certificate name. An attacker could
exploit this to perform a man in the middle attack to view
sensitive information or alter encrypted communications.
Dan Kaminsky discovered NSS would still accept certificates
with MD2 hash signatures. As a result, an attacker could
potentially create a malicious trusted certificate to
impersonate another site. (CVE-2009-2409).
Update the affected libnss3-1d package.
Risk factor :
High / CVSS Base Score : 9.3