CVE-2010-3170
Published: 20 October 2010
Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
Notes
Author | Note |
---|---|
jdstrand |
real problem but with very unlikely circumstances needs new NSPR |
Priority
Status
Package | Release | Status |
---|---|---|
nspr
Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
hardy |
Not vulnerable
|
|
jaunty |
Not vulnerable
|
|
karmic |
Not vulnerable
|
|
lucid |
Not vulnerable
|
|
maverick |
Not vulnerable
|
|
upstream |
Released
(4.8.6)
|
|
nss
Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
hardy |
Released
(3.12.8-0ubuntu0.8.04.1)
|
|
jaunty |
Released
(3.12.8-0ubuntu0.9.04.1)
|
|
karmic |
Released
(3.12.8-0ubuntu0.9.10.1)
|
|
lucid |
Released
(3.12.8-0ubuntu0.10.04.1)
|
|
maverick |
Released
(3.12.8-0ubuntu0.10.10.1)
|
|
upstream |
Released
(3.12.8)
|