Lucene search

K
ubuntucveUbuntu.comUB:CVE-2009-2061
HistoryJun 15, 2009 - 12:00 a.m.

CVE-2009-2061

2009-06-1500:00:00
ubuntu.com
ubuntu.com
12

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.001

Percentile

31.6%

Mozilla Firefox before 3.0.10 processes a 3xx HTTP CONNECT response before
a successful SSL handshake, which allows man-in-the-middle attackers to
execute arbitrary web script, in an https siteโ€™s context, by modifying this
CONNECT response to specify a 302 redirect to an arbitrary https web site.

Bugs

Notes

Author Note
jdstrand https://www.paypal.com/ is the PoC site, but https://wiki.ubuntu.com seems to be a valid trigger as well (both set a cookie which is sent on connect). https://www.verisign.com will trigger the alert() in the PoC, but doesnโ€™t contain the cookie firefox-3.0 (3.0.9) is confirmed to be affected mozilla is silently fixing this in 3.0.10, but it wonโ€™t be public until the CRD konqueror 3 (kdelibs) in dapper is confirmed to be affected konqueror 4 (kde4libs) in jaunty does not seem to be affected (displays itโ€™s own connection refused message for all 4xx codes) webkit on jaunty does not seem affected, though all of its consumers are rather flaky (midori, python-webkit/webbrowser.py, webkit/GtkLauncher, kazehakase-webkit). None of these would work with paypal or wiki.u.c, but would with https://www.verisign.com/. At verisign, firefox would display the PoC alert, but without the cookie. webkit, midori and python-webkit would not display the alert at all (kazehakase crashes on any page load). Other consumers are devhelp and anjuta, but I didnโ€™t see how to get an external page to load. At any rate, webkit is a tentative โ€˜not-affectedโ€™. Will get more feedback from Debian maintainer. qt4-x11 in jaunty does not seem to be affected. arora is its browser consumer and it displays its own โ€˜HTTP request failedโ€™ message for all 4xx codes also checked epiphany-webkit on 8.10. The browser can go to paypal, but is not vulnerable (does not display the alert at all for all 4xx codes)
OSVersionArchitecturePackageVersionFilename
ubuntu8.04noarchseamonkey<ย 1.1.17+nobinonly-0ubuntu0.8.04.1UNKNOWN
ubuntu8.10noarchseamonkey<ย 1.1.17+nobinonly-0ubuntu0.8.10.1UNKNOWN
ubuntu9.04noarchseamonkey<ย 1.1.17+nobinonly-0ubuntu0.9.04.1UNKNOWN
ubuntu9.10noarchseamonkey<ย 1.1.17+nobinonly-0ubuntu1UNKNOWN
ubuntu10.04noarchseamonkey<ย 1.1.17+nobinonly-0ubuntu1UNKNOWN
ubuntu10.10noarchseamonkey<ย 1.1.17+nobinonly-0ubuntu1UNKNOWN
ubuntu11.04noarchseamonkey<ย 1.1.17+nobinonly-0ubuntu1UNKNOWN
ubuntu8.04noarchxulrunner-1.9<ย 1.9.0.11+build2+nobinonly-0ubuntu0.8.04.1UNKNOWN
ubuntu8.10noarchxulrunner-1.9<ย 1.9.0.11+build2+nobinonly-0ubuntu0.8.10.2UNKNOWN
ubuntu9.04noarchxulrunner-1.9<ย 1.9.0.11+build2+nobinonly-0ubuntu0.9.04.1UNKNOWN
Rows per page:
1-10 of 121

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.001

Percentile

31.6%