Mozilla Products NSS Code Execution and Security Bypass Vulnerabilities
RISK: Medium Risk
Two vulnerabilities have been identified in Mozilla Firefox, Thunderbird and Seamonkey, which could be exploited by remote attackers to bypass security restrictions or compromise a vulnerable system. These issues are caused by errors in NSS.
1. A heap overflow in a regular expression parser when checking if the hostname of a visited web site matches the Common Name (CN) field of the presented certificate, which could allow attackers to execute arbitrary code via a malicious certificate.
2. Anerror when handling NULL characters in a certificate, which could allow man-in-the-middle attacks.
Impact
- Denial of Service
- Remote Code Execution
- Security Restriction Bypass
System / Technologies affected
- Mozilla Firefox versions 3.x
- Mozilla Thunderbird versions 2.x
- Mozilla SeaMonkey versions 1.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
Mozilla Firefox - upgrade to Mozilla Firefox version 3.5 :
http://www.mozilla.com/firefox/Mozilla SeaMonkey - do not browse untrusted websites.
Mozilla Thunderbird - do not open mails from untrusted sources.
Vulnerability Identifier
Source
Related Link
Share with