Release Date: | 2009-08-03 | |
Impact: | Critical | What is this? |
Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.
See more information about CVE-2009-2404 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS metrics and score provided are preliminary and subject to review.
Base Score: | 9.3 |
Vector String: | AV:N/AC:M/Au:N/C:C/I:C/A:C |
Version: | 2.0 |
Attack Vector: | Network |
Attack Complexity: | Medium |
Authentication: | None |
Confidentiality Impact: | Complete |
Integrity Impact: | Complete |
Availability Impact: | Complete |
Platform | Errata | Release Date |
Oracle Enterprise Linux version 4 (nspr) | ELSA-2009-1184 | 2009-07-30 |
Oracle Enterprise Linux version 4 (nss) | ELSA-2009-1184 | 2009-07-30 |
Oracle Linux version 5 (nspr) | ELSA-2009-1184 | 2009-07-30 |
Oracle Linux version 5 (nspr) | ELSA-2009-1186 | 2009-07-21 |
Oracle Linux version 5 (nss) | ELSA-2009-1184 | 2009-07-30 |
Oracle Linux version 5 (nss) | ELSA-2009-1186 | 2009-07-21 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: