USN-810-1: NSS vulnerabilities

04 August 2009

NSS vulnerabilities

Releases

Packages

  • nss -

Details

Moxie Marlinspike discovered that NSS did not properly handle regular
expressions in certificate names. A remote attacker could create a
specially crafted certificate to cause a denial of service (via application
crash) or execute arbitrary code as the user invoking the program.
(CVE-2009-2404)

Moxie Marlinspike and Dan Kaminsky independently discovered that NSS did
not properly handle certificates with NULL characters in the certificate
name. An attacker could exploit this to perform a man in the middle attack
to view sensitive information or alter encrypted communications.
(CVE-2009-2408)

Dan Kaminsky discovered NSS would still accept certificates with MD2 hash
signatures. As a result, an attacker could potentially create a malicious
trusted certificate to impersonate another site. (CVE-2009-2409)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 9.04
Ubuntu 8.10
Ubuntu 8.04

After a standard system upgrade you need to restart any applications that
use NSS, such as Firefox, to effect the necessary changes.

Related notices

  • USN-859-1: icedtea6-plugin, openjdk-6-jre, openjdk-6
  • USN-809-1: gnutls12, gnutls26, gnutls13, libgnutls12, libgnutls26, libgnutls13
  • USN-830-1: libssl0.9.8, openssl