Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.
2009-08-03T14:30:00.610
2025-04-09T00:30:58.490
Deferred
CVSSv2: 9.3 (HIGH)
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.6
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | mozilla | network_security_services | 3.12.3 | Yes |
Application | aol | instant_messenger | * | No |
Application | gnome | evolution | * | No |
Application | mozilla | firefox | * | No |
Application | mozilla | seamonkey | * | No |
Application | mozilla | thunderbird | * | No |
Application | pidgin | pidgin | * | No |