Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
2009-07-30T19:30:00.313
2025-04-09T00:30:58.490
Deferred
CVSSv3.1: 5.9 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.6
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | mozilla | firefox | < 3.0.13 | Yes |
Application | mozilla | network_security_services | < 3.12.3 | Yes |
Application | mozilla | seamonkey | < 1.1.18 | Yes |
Application | mozilla | thunderbird | < 2.0.0.23 | Yes |
Operating System | opensuse | opensuse | ≤ 11.1 | Yes |
Operating System | suse | linux_enterprise | 10.0 | Yes |
Operating System | suse | linux_enterprise | 11.0 | Yes |
Operating System | suse | linux_enterprise_server | 9 | Yes |
Operating System | debian | debian_linux | 5.0 | Yes |
Operating System | canonical | ubuntu_linux | 8.04 | Yes |
Operating System | canonical | ubuntu_linux | 8.10 | Yes |
Operating System | canonical | ubuntu_linux | 9.04 | Yes |