CVE-2009-2404

HIGH

Description

Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.

References

http://rhn.redhat.com/errata/RHSA-2009-1185.html

http://secunia.com/advisories/36088

http://secunia.com/advisories/36102

http://secunia.com/advisories/36125

http://secunia.com/advisories/36139

http://secunia.com/advisories/36157

http://secunia.com/advisories/36434

http://secunia.com/advisories/37098

http://secunia.com/advisories/39428

http://sunsolve.sun.com/search/document.do?assetkey=1-66-273910-1

http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021030.1-1

http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021699.1-1

http://www.blackhat.com/presentations/bh-usa-09/MARLINSPIKE/BHUSA09-Marlinspike-DefeatSSL-SLIDES.pdf

http://www.debian.org/security/2009/dsa-1874

http://www.mandriva.com/security/advisories?name=MDVSA-2009:197

http://www.mandriva.com/security/advisories?name=MDVSA-2009:216

http://www.mozilla.org/security/announce/2009/mfsa2009-43.html

http://www.novell.com/linux/security/advisories/2009_48_firefox.html

http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html

http://www.redhat.com/support/errata/RHSA-2009-1207.html

http://www.securityfocus.com/bid/35891

http://www.ubuntu.com/usn/usn-810-1

http://www.us-cert.gov/cas/techalerts/TA10-103B.html

http://www.vupen.com/english/advisories/2009/2085

https://bugzilla.redhat.com/show_bug.cgi?id=512912

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11174

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8658

https://usn.ubuntu.com/810-2/

Details

Source: MITRE

Published: 2009-08-03

Updated: 2018-10-03

Type: CWE-119

Risk Information

CVSS v2.0

Base Score: 9.3

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 8.6

Severity: HIGH

Tenable Plugins

View all (37 total)

IDNameProductFamilySeverity
89735VMware ESX Third-Party Libraries Multiple Vulnerabilities (VMSA-2010-0001) (remote check)NessusVMware ESX Local Security Checks
critical
67903Oracle Linux 3 : seamonkey (ELSA-2009-1185)NessusOracle Linux Local Security Checks
high
67902Oracle Linux 4 / 5 : nspr / nss (ELSA-2009-1184)NessusOracle Linux Local Security Checks
high
65117Ubuntu 8.04 LTS / 8.10 / 9.04 : nss regression (USN-810-3)NessusUbuntu Local Security Checks
high
63889RHEL 5 : nspr and nss (RHSA-2009:1207)NessusRed Hat Local Security Checks
high
63888RHEL 4 : nspr and nss (RHSA-2009:1190)NessusRed Hat Local Security Checks
high
63402GLSA-201301-01 : Mozilla Products: Multiple vulnerabilities (BEAST)NessusGentoo Local Security Checks
critical
60632Scientific Linux Security Update : nspr and nss for SL 5.x on i386/x86_64NessusScientific Linux Local Security Checks
high
60631Scientific Linux Security Update : nspr and nss for SL 4.x on i386/x86_64NessusScientific Linux Local Security Checks
high
60630Scientific Linux Security Update : seamonkey on SL3.x i386/x86_64NessusScientific Linux Local Security Checks
high
45397Debian DSA-2025-1 : icedove - several vulnerabilitiesNessusDebian Local Security Checks
critical
44739Debian DSA-1874-1 : nss - several vulnerabilitiesNessusDebian Local Security Checks
high
43826VMSA-2010-0001 : ESX Service Console and vMA updates for nss and nsprNessusVMware ESX Local Security Checks
critical
42327openSUSE 10 Security Update : seamonkey (seamonkey-6538)NessusSuSE Local Security Checks
high
42206openSUSE Security Update : seamonkey (seamonkey-1364)NessusSuSE Local Security Checks
high
42202openSUSE Security Update : seamonkey (seamonkey-1364)NessusSuSE Local Security Checks
high
42200SuSE9 Security Update : epiphany (YOU Patch Number 12521)NessusSuSE Local Security Checks
high
42190SuSE 10 Security Update : Mozilla NSS (ZYPP Patch Number 6541)NessusSuSE Local Security Checks
high
42013openSUSE 10 Security Update : libfreebl3 (libfreebl3-6494)NessusSuSE Local Security Checks
high
41419SuSE 11 Security Update : Mozilla Firefox (SAT Patch Number 1199)NessusSuSE Local Security Checks
high
40874SeaMonkey < 1.1.18 Multiple VulnerabilitiesNessusWindows
high
801235Mozilla SeaMonkey < 1.1.18 Multiple VulnerabilitiesLog Correlation EngineWeb Clients
high
5152SeaMonkey < 1.1.18 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
medium
40652openSUSE Security Update : libfreebl3 (libfreebl3-1201)NessusSuSE Local Security Checks
high
40645openSUSE Security Update : libfreebl3 (libfreebl3-1201)NessusSuSE Local Security Checks
high
40523Mandriva Linux Security Advisory : firefox (MDVSA-2009:198)NessusMandriva Local Security Checks
high
40522Mandriva Linux Security Advisory : nss (MDVSA-2009:197-3)NessusMandriva Local Security Checks
high
40491Ubuntu 8.04 LTS / 8.10 / 9.04 : nspr update (USN-810-2)NessusUbuntu Local Security Checks
high
40490Ubuntu 8.04 LTS / 8.10 / 9.04 : nss vulnerabilities (USN-810-1)NessusUbuntu Local Security Checks
high
40485FreeBSD : mozilla -- multiple vulnerabilities (49e8f2ee-8147-11de-a994-0030843d3802)NessusFreeBSD Local Security Checks
high
40478Firefox < 3.0.13 Multiple VulnerabilitiesNessusWindows
high
800771Firefox < 3.0.13/3.5.0 Multiple VulnerabilitiesLog Correlation EngineWeb Clients
high
5113Mozilla Firefox < 3.0.13/3.5.0 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
medium
40441RHEL 5 : nspr and nss (RHSA-2009:1186)NessusRed Hat Local Security Checks
high
40440RHEL 3 : seamonkey (RHSA-2009:1185)NessusRed Hat Local Security Checks
high
40439RHEL 4 : nspr and nss (RHSA-2009:1184)NessusRed Hat Local Security Checks
high
40437CentOS 3 : seamonkey (CESA-2009:1185)NessusCentOS Local Security Checks
high