Lucene search

K
mozillaMozilla FoundationMFSA2010-70
HistoryOct 19, 2010 - 12:00 a.m.

SSL wildcard certificate matching IP addresses — Mozilla

2010-10-1900:00:00
Mozilla Foundation
www.mozilla.org
18

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.001

Percentile

46.7%

Security researcher Richard Moore reported that when an SSL certificate was created with a common name containing a wildcard followed by a partial IP address a valid SSL connection could be established with a server whose IP address matched the wildcard range by browsing directly to the IP address. It is extremely unlikely that such a certificate would be issued by a Certificate Authority.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.5.14
OR
mozillafirefoxRange<3.6.11
OR
mozillaseamonkeyRange<2.0.9
OR
mozillathunderbirdRange<3.0.9
OR
mozillathunderbirdRange<3.1.5
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
mozillathunderbird*cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.001

Percentile

46.7%