Vulnerabilidad en Mozilla Firefox, SeaMonkey y Netscape (CVE-2008-2809)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-20
Validación incorrecta de entrada
Fecha de publicación:
08/07/2008
Última modificación:
11/10/2018
Descripción
Mozilla 1.9 M8 y anteriores, Mozilla Firefox 2 y anteriores a 2.0.0.15, SeaMonkey 1.1.5 y otras versiones anteriores a 1.1.10, Netscape 9.0, y otras navegadores basados en Mozilla, cuando un usuario aceptar un certificado SSL de servidor sobre las bases del nombre de dominio CN en el campo DN, considerando que el certificado es también aceptado por todos los nombres de dominio en el campo subjectAltName:dNSName, el cual hace más fácil a los atacantes remotos engañar a un usuario aceptando un certificado no válido para una página web falsa.
Impacto
Puntuación base 2.0
4.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:* | ||
cpe:2.3:a:mozilla:geckb:*:m8:*:*:*:*:*:* | 1.9 (incluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html
- http://nils.toedtmann.net/pub/subjectAltName.txt
- http://rhn.redhat.com/errata/RHSA-2008-0616.html
- http://secunia.com/advisories/30878
- http://secunia.com/advisories/30898
- http://secunia.com/advisories/30903
- http://secunia.com/advisories/30911
- http://secunia.com/advisories/30949
- http://secunia.com/advisories/31005
- http://secunia.com/advisories/31008
- http://secunia.com/advisories/31021
- http://secunia.com/advisories/31023
- http://secunia.com/advisories/31069
- http://secunia.com/advisories/31076
- http://secunia.com/advisories/31183
- http://secunia.com/advisories/31195
- http://secunia.com/advisories/31220
- http://secunia.com/advisories/31253
- http://secunia.com/advisories/31286
- http://secunia.com/advisories/31377
- http://secunia.com/advisories/31403
- http://secunia.com/advisories/33433
- http://secunia.com/advisories/34501
- http://security.gentoo.org/glsa/glsa-200808-03.xml
- http://securityreason.com/securityalert/3498
- http://securitytracker.com/id?1018979=
- http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152
- http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.384911
- http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.410484
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
- http://wiki.rpath.com/Advisories:rPSA-2008-0216
- http://www.debian.org/security/2008/dsa-1607
- http://www.debian.org/security/2008/dsa-1615
- http://www.debian.org/security/2008/dsa-1621
- http://www.debian.org/security/2009/dsa-1697
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A136
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A155
- http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15
- http://www.mozilla.org/security/announce/2008/mfsa2008-31.html
- http://www.redhat.com/support/errata/RHSA-2008-0547.html
- http://www.redhat.com/support/errata/RHSA-2008-0549.html
- http://www.redhat.com/support/errata/RHSA-2008-0569.html
- http://www.securityfocus.com/archive/1/483929/100/100/threaded
- http://www.securityfocus.com/archive/1/483937/100/100/threaded
- http://www.securityfocus.com/archive/1/483960/100/100/threaded
- http://www.securityfocus.com/archive/1/494080/100/0/threaded
- http://www.securityfocus.com/bid/30038
- http://www.securitytracker.com/id?1020419=
- http://www.ubuntu.com/usn/usn-619-1
- http://www.ubuntu.com/usn/usn-629-1
- http://www.vupen.com/english/advisories/2008/1993/references
- http://www.vupen.com/english/advisories/2009/0977
- https://bugzilla.mozilla.org/show_bug.cgi?id=240261
- https://bugzilla.mozilla.org/show_bug.cgi?id=327181
- https://bugzilla.mozilla.org/show_bug.cgi?id=402347
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43524
- https://issues.rpath.com/browse/RPL-2646
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10205
- https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00125.html
- https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00144.html
- https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html
- https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html
- https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html