Release Date: | 2009-08-03 |
Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.
See more information about CVE-2009-2404 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.
Base Score: | 9.3 | Base Metrics: | AV:N/AC:M/Au:N/C:C/I:C/A:C |
Access Vector: | Network | Attack Complexity: | Medium |
Authentication: | None required | Confidentiality Impact: | Complete |
Integrity Impact: | Complete | Availability Impact: | Complete |
Platform | Errata | Release Date |
Oracle Enterprise Linux version 4 (nspr) | ELSA-2009-1184 | 2009-07-30 |
Oracle Enterprise Linux version 4 (nss) | ELSA-2009-1184 | 2009-07-30 |
Oracle Linux version 5 (nspr) | ELSA-2009-1184 | 2009-07-30 |
Oracle Linux version 5 (nspr) | ELSA-2009-1186 | 2009-07-21 |
Oracle Linux version 5 (nss) | ELSA-2009-1184 | 2009-07-30 |
Oracle Linux version 5 (nss) | ELSA-2009-1186 | 2009-07-21 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team