Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2008-2809


Mozilla 1.9 M8 and earlier, Mozilla Firefox 2 before 2.0.0.15, SeaMonkey 1.1.5 and other versions before 1.1.10, Netscape 9.0, and other Mozilla-based web browsers, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regard the certificate as also accepted for all domain names in subjectAltName:dNSName fields, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.


Published

2008-07-08T23:41:00.000

Last Modified

2025-04-09T00:30:58.490

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 4.0 (MEDIUM)

CVSSv2 Vector

AV:N/AC:H/Au:N/C:N/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: HIGH
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

4.9

Impact Score

4.9

Weaknesses
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application mozilla firefox 2.0.0.1 Yes
Application mozilla firefox 2.0.0.2 Yes
Application mozilla firefox 2.0.0.3 Yes
Application mozilla firefox 2.0.0.4 Yes
Application mozilla firefox 2.0.0.5 Yes
Application mozilla firefox 2.0.0.6 Yes
Application mozilla firefox 2.0.0.7 Yes
Application mozilla firefox 2.0.0.8 Yes
Application mozilla firefox 2.0.0.9 Yes
Application mozilla firefox 2.0.0.10 Yes
Application mozilla firefox 2.0.0.11 Yes
Application mozilla firefox 2.0.0.12 Yes
Application mozilla firefox 2.0.0.13 Yes
Application mozilla firefox 2.0.0.14 Yes
Application mozilla geckb ≤ 1.9 Yes
Application mozilla seamonkey ≤ 1.0.9 Yes
Application mozilla seamonkey 1.1.5 Yes
Application netscape navigator 9.0 Yes

References