Upstream information

CVE-2009-2404 at MITRE

Description

Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having critical severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 9.3
Vector AV:N/AC:M/Au:N/C:C/I:C/A:C
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
SUSE Bugzilla entries: 522602 [RESOLVED / FIXED], 544910 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Server 11
SUSE Linux Enterprise Server for SAP Applications 11
  • libfreebl3 >= 3.12.3.1-1.1.1
  • libfreebl3-32bit >= 3.12.3.1-1.1.1
  • libfreebl3-x86 >= 3.12.8-1.2.1
  • mozilla-nspr >= 4.8.6-1.2.1
  • mozilla-nspr-32bit >= 4.8.6-1.2.1
  • mozilla-nspr-x86 >= 4.8.6-1.2.1
  • mozilla-nss >= 3.12.3.1-1.1.1
  • mozilla-nss-32bit >= 3.12.3.1-1.1.1
  • mozilla-nss-tools >= 3.12.3.1-1.1.1
  • mozilla-nss-x86 >= 3.12.8-1.2.1
  • zlib >= 1.2.3-106.34
  • zlib-32bit >= 1.2.3-106.34
  • zlib-x86 >= 1.2.3-106.34
Patchnames:
slessp0-libfreebl3


SUSE Timeline for this CVE

CVE page created: Fri Jun 28 07:00:19 2013
CVE page last modified: Tue Jul 2 15:18:23 2024