Mozilla Firefox Certificate Regexp Parsing Heap Overflow
Publish Date: 21 juillet 2015
Gravité: : Critique
Identifiant(s) CVE: : CVE-2009-2404
Date du conseil: 21 juillet 2015
Description
Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.
Information Exposure Rating:
Apply associated Trend Micro DPI Rules.
Solutions
Trend Micro Deep Security DPI Rule Number: 1003670
Trend Micro Deep Security DPI Rule Name: 1003670 - Multiple Browser Certificate Regexp Parsing Heap Overflow
Affected software and version:
- Mozilla Network Security Services 3.12.3