CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
AI Score
Confidence
High
EPSS
Percentile
53.0%
The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) before 3.16 accepts a wildcard character that is embedded in an internationalized domain name’s U-label, which might allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
Vendor | Product | Version | CPE |
---|---|---|---|
mozilla | network_security_services | * | cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:* |
mozilla | network_security_services | 3.2 | cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:* |
mozilla | network_security_services | 3.2.1 | cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:* |
mozilla | network_security_services | 3.3 | cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:* |
mozilla | network_security_services | 3.3.1 | cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:* |
mozilla | network_security_services | 3.3.2 | cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:* |
mozilla | network_security_services | 3.4 | cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:* |
mozilla | network_security_services | 3.4.1 | cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:* |
mozilla | network_security_services | 3.4.2 | cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:* |
mozilla | network_security_services | 3.5 | cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:* |
kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html
lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html
lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html
lists.opensuse.org/opensuse-updates/2014-05/msg00010.html
lists.opensuse.org/opensuse-updates/2014-05/msg00033.html
seclists.org/fulldisclosure/2014/Dec/23
secunia.com/advisories/59866
secunia.com/advisories/60621
secunia.com/advisories/60794
www.debian.org/security/2014/dsa-2994
www.mozilla.org/security/announce/2014/mfsa2014-45.html
www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
www.securityfocus.com/archive/1/534161/100/0/threaded
www.securityfocus.com/bid/66356
www.ubuntu.com/usn/USN-2159-1
www.ubuntu.com/usn/USN-2185-1
www.vmware.com/security/advisories/VMSA-2014-0012.html
bugzilla.mozilla.org/show_bug.cgi?id=903885
bugzilla.redhat.com/show_bug.cgi?id=1079851
developer.mozilla.org/en-US/docs/NSS/NSS_3.16_release_notes
hg.mozilla.org/projects/nss/rev/709d4e597979
security.gentoo.org/glsa/201504-01