Network Security Services (NSS) parser buffer overflow

nss-parser-bo (52139) The risk level is classified as HighHigh Risk

Description:

Network Security Services (NSS) is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by the regular expression parser when matching the Common Name (CN) field in x509 certificates. By persuading a victim to visit a Web site containing a specially-crafted certificate signed by a trusted Certificate Authority (CA) or clicking a dialog box to accept a specially-crafted self-signed certificate, a remote attacker could overflow a buffer and execute arbitrary code on the system.

*CVSS:

Base Score: 9.3
  Access Vector: Network
  Access Complexity: Medium
  Authentication: None
  Confidentiality Impact: Complete
  Integrity Impact: Complete
  Availability Impact: Complete
 
Temporal Score: 6.9
  Exploitability: Unproven
  Remediation Level: Official-Fix
  Report Confidence: Confirmed

Consequences:

Gain Access

Remedy:

Upgrade to the latest version of Network Security Services (3.12.3 or later), available from the Mozilla Web site. See References.

For other distributions:
Apply the appropriate update for your system. See References.

References:

  • IBM Internet Security Systems Protection Alert: Network Security Services (NSS) Parser RCE.
  • MFSA 2009-43: Heap overflow in certificate regexp parsing.
  • Mozilla Web site: Network Security Services (NSS).
  • Oracle Critical Patch Update Advisory - April 2010: Oracle Critical Patch Update Advisory - April 2010.
  • Red Hat Bugzilla Bug 512912: nss regexp heap overflow.
  • Sun Alert ID: 269468: Security Vulnerability in Mozilla Thunderbird Related to SSL Certificates May Cause Arbitrary Code Execution.
  • Sun Alert ID: 273910: This Alert covers CVE-2009-2404 and CVE-2009-0688 for the Directory Server component of the Sun ONE Directory Server and Sun Java System Directory Server products..
  • BID-35891: Mozilla Firefox and Seamonkey Regular Expression Parsing Heap Buffer Overflow Vulnerability
  • BID-39333: RETIRED: Oracle April 2010 Critical Patch Update Multiple Vulnerabilities
  • CVE-2009-2404: Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.
  • DSA-1874: nss -- several vulnerabilities
  • DSA-2025: icedove -- several vulnerabilities
  • MDVSA-2009:197: nss
  • MDVSA-2009:197-1: nss
  • MDVSA-2009:197-2: nss
  • MDVSA-2009:197-3: nss
  • MDVSA-2009:198: firefox
  • MDVSA-2009:216: mozilla-thunderbird
  • RHSA-2009-1184: Critical: nspr and nss security and bug fix update
  • RHSA-2009-1185: Critical: seamonkey security update
  • RHSA-2009-1186: Critical: nspr and nss security, bug fix, and enhancement update
  • RHSA-2009-1190: Critical: nspr and nss security and bug fix update
  • RHSA-2009-1207: Critical: nspr and nss security update
  • SA36088: Mozilla Firefox Network Security Services Multiple Vulnerabilities
  • SA36093: Network Security Services Multiple Vulnerabilities
  • SA36125: Mozilla Thunderbird / SeaMonkey Network Security Services Vulnerabilities
  • SA37009: Sun Solaris Thunderbird Network Security Services Vulnerabilities
  • SA37032: Sun Solaris and Java Enterprise System Network Security Services Vulnerability
  • SA39428: Sun Java System Directory Server Two Vulnerabilities
  • SUSE-SA:2009:048: Mozilla Firefox security update
  • USN-810-1: NSS vulnerabilities
  • USN-810-2: NSPR update
  • USN-810-3: NSS regression

Platforms Affected:

  • Canonical Ubuntu 8.04 LTS
  • Canonical Ubuntu 8.10
  • Debian Debian Linux 5.0
  • MandrakeSoft Mandrake Linux 2008.0
  • MandrakeSoft Mandrake Linux 2008.0 X86_64
  • MandrakeSoft Mandrake Linux 2008.1
  • MandrakeSoft Mandrake Linux 2008.1 X86_64
  • MandrakeSoft Mandrake Linux Corporate Server 3.0
  • MandrakeSoft Mandrake Linux Corporate Server 3.0 X86_64
  • Mandriva Enterprise Server 5
  • Mandriva Enterprise Server 5 X86_64
  • Mandriva Linux 2009.0 X86_64
  • Mandriva Linux 2009.0
  • Mandriva Linux 2009.1 X86_64
  • Mandriva Linux 2009.1
  • Mozilla Firefox 3.0 Beta3
  • Mozilla Firefox 3.0 Beta2
  • Mozilla Firefox 3.0 Beta5
  • Mozilla Firefox 3.0
  • Mozilla Firefox 3.0 Beta4
  • Mozilla Firefox 3.0 Beta1
  • Mozilla Firefox 3.0 Alpha
  • Mozilla Firefox 3.0.1
  • Mozilla Firefox 3.0.10
  • Mozilla Firefox 3.0.12
  • Mozilla Network Security Services 3.11.2
  • Mozilla Network Security Services 3.11.3
  • Mozilla Network Security Services 3.11.4
  • Mozilla Network Security Services 3.11.5
  • Mozilla Network Security Services 3.12.3
  • Mozilla SeaMonkey 1.0 Beta
  • Mozilla SeaMonkey 1.0 Alpha
  • Mozilla SeaMonkey 1.0
  • Mozilla SeaMonkey 1.0 Dev
  • Mozilla SeaMonkey 1.0.1
  • Mozilla SeaMonkey 1.0.2
  • Mozilla SeaMonkey 1.0.3
  • Mozilla SeaMonkey 1.0.4
  • Mozilla SeaMonkey 1.0.5
  • Mozilla SeaMonkey 1.0.6
  • Mozilla SeaMonkey 1.0.7
  • Mozilla SeaMonkey 1.0.8
  • Novell OpenSUSE 10.3
  • Novell OpenSUSE 11.0
  • Novell SLE SDK 10
  • Novell SLE SDK 10 SP2
  • Novell SUSE Linux Enterprise 10 SP2 DEBUGINFO
  • Novell SUSE Linux Enterprise Desktop 10 SP2
  • Novell SUSE Linux Enterprise Server 10 SP2
  • Novell SUSE Linux Enterprise Server 10
  • RedHat Enterprise Linux 3 WS
  • RedHat Enterprise Linux 3 ES
  • RedHat Enterprise Linux 3 AS
  • RedHat Enterprise Linux 3 Desktop
  • RedHat Enterprise Linux 4 AS
  • RedHat Enterprise Linux 4 Desktop
  • RedHat Enterprise Linux 4 WS
  • RedHat Enterprise Linux 4 ES
  • RedHat Enterprise Linux 4.7.z AS
  • RedHat Enterprise Linux 4.8.z AS
  • RedHat Enterprise Linux 4.8.z ES
  • RedHat Enterprise Linux 5 Client
  • RedHat Enterprise Linux 5 Client Workstation
  • RedHat Enterprise Linux 5
  • RedHat Enterprise Linux 5.2.z EUS
  • RedHat Enterprise Linux 5.3.z EUS
  • RedHat Enterprise Linux Long Life 5.3
  • RedHat Red Hat Enterprise Linux 4.7.z ES
  • RedHat RHEL Extras 4
  • Sun OpenSolaris build_snv_100 x86
  • Sun OpenSolaris build_snv_100 SPARC
  • Sun OpenSolaris build_snv_101 x86
  • Sun OpenSolaris build_snv_101 SPARC
  • Sun OpenSolaris build_snv_102 SPARC
  • Sun OpenSolaris build_snv_102 x86
  • Sun OpenSolaris build_snv_103 x86
  • Sun OpenSolaris build_snv_103 SPARC
  • Sun OpenSolaris build_snv_104 x86
  • Sun OpenSolaris build_snv_104 SPARC
  • Sun OpenSolaris build_snv_105 SPARC
  • Sun OpenSolaris build_snv_105 x86
  • Sun OpenSolaris build_snv_106 x86
  • Sun OpenSolaris build_snv_106 SPARC
  • Sun OpenSolaris build_snv_107 SPARC
  • Sun OpenSolaris build_snv_107 x86
  • Sun OpenSolaris build_snv_108 x86
  • Sun OpenSolaris build_snv_108 SPARC
  • Sun OpenSolaris build_snv_109 x86
  • Sun OpenSolaris build_snv_109 SPARC
  • Sun OpenSolaris build_snv_110 SPARC
  • Sun OpenSolaris build_snv_110 x86
  • Sun OpenSolaris build_snv_111 x86
  • Sun OpenSolaris build_snv_111 SPARC
  • Sun OpenSolaris build_snv_112 SPARC
  • Sun OpenSolaris build_snv_112 x86
  • Sun OpenSolaris build_snv_113 SPARC
  • Sun OpenSolaris build_snv_113 x86
  • Sun OpenSolaris build_snv_114 SPARC
  • Sun OpenSolaris build_snv_114 x86
  • Sun OpenSolaris build_snv_115 SPARC
  • Sun OpenSolaris build_snv_115 x86
  • Sun OpenSolaris build_snv_116 SPARC
  • Sun OpenSolaris build_snv_116 x86
  • Sun OpenSolaris build_snv_117 SPARC
  • Sun OpenSolaris build_snv_117 x86
  • Sun OpenSolaris build_snv_118 SPARC
  • Sun OpenSolaris build_snv_118 x86
  • Sun OpenSolaris build_snv_119 SPARC
  • Sun OpenSolaris build_snv_119 x86
  • Sun OpenSolaris build_snv_120 SPARC
  • Sun OpenSolaris build_snv_120 x86
  • Sun OpenSolaris build_snv_121 SPARC
  • Sun OpenSolaris build_snv_121 x86
  • Sun OpenSolaris build_snv_122 x86
  • Sun OpenSolaris build_snv_122 SPARC
  • Sun OpenSolaris build_snv_123 SPARC
  • Sun OpenSolaris build_snv_123 x86
  • Sun OpenSolaris build_snv_124 x86
  • Sun OpenSolaris build_snv_124 SPARC
  • Sun OpenSolaris build_snv_48 SPARC
  • Sun OpenSolaris build_snv_48 x86
  • Sun OpenSolaris build_snv_49 SPARC
  • Sun OpenSolaris build_snv_49 x86
  • Sun OpenSolaris build_snv_50 SPARC
  • Sun OpenSolaris build_snv_50 x86
  • Sun OpenSolaris build_snv_51 x86
  • Sun OpenSolaris build_snv_51 SPARC
  • Sun OpenSolaris build_snv_52 x86
  • Sun OpenSolaris build_snv_52 SPARC
  • Sun OpenSolaris build_snv_53 SPARC
  • Sun OpenSolaris build_snv_53 x86
  • Sun OpenSolaris build_snv_54 SPARC
  • Sun OpenSolaris build_snv_54 x86
  • Sun OpenSolaris build_snv_55 SPARC
  • Sun OpenSolaris build_snv_55 x86
  • Sun OpenSolaris build_snv_56 x86
  • Sun OpenSolaris build_snv_56 SPARC
  • Sun OpenSolaris build_snv_57 SPARC
  • Sun OpenSolaris build_snv_57 x86
  • Sun OpenSolaris build_snv_58 x86
  • Sun OpenSolaris build_snv_58 SPARC
  • Sun OpenSolaris build_snv_59 x86
  • Sun OpenSolaris build_snv_59 SPARC
  • Sun OpenSolaris build_snv_60 SPARC
  • Sun OpenSolaris build_snv_60 x86
  • Sun OpenSolaris build_snv_61 x86
  • Sun OpenSolaris build_snv_61 SPARC
  • Sun OpenSolaris build_snv_62 SPARC
  • Sun OpenSolaris build_snv_62 x86
  • Sun OpenSolaris build_snv_63 SPARC
  • Sun OpenSolaris build_snv_63 x86
  • Sun OpenSolaris build_snv_64 x86
  • Sun OpenSolaris build_snv_64 SPARC
  • Sun OpenSolaris build_snv_65 SPARC
  • Sun OpenSolaris build_snv_65 x86
  • Sun OpenSolaris build_snv_66 x86
  • Sun OpenSolaris build_snv_66 SPARC
  • Sun OpenSolaris build_snv_67 x86
  • Sun OpenSolaris build_snv_67 SPARC
  • Sun OpenSolaris build_snv_68 x86
  • Sun OpenSolaris build_snv_68 SPARC
  • Sun OpenSolaris build_snv_69 SPARC
  • Sun OpenSolaris build_snv_69 x86
  • Sun OpenSolaris build_snv_70 SPARC
  • Sun OpenSolaris build_snv_70 x86
  • Sun OpenSolaris build_snv_71 SPARC
  • Sun OpenSolaris build_snv_71 x86
  • Sun OpenSolaris build_snv_72 x86
  • Sun OpenSolaris build_snv_72 SPARC
  • Sun OpenSolaris build_snv_73 SPARC
  • Sun OpenSolaris build_snv_73 x86
  • Sun OpenSolaris build_snv_74 x86
  • Sun OpenSolaris build_snv_74 SPARC
  • Sun OpenSolaris build_snv_75 SPARC
  • Sun OpenSolaris build_snv_75 x86
  • Sun OpenSolaris build_snv_76 x86
  • Sun OpenSolaris build_snv_76 SPARC
  • Sun OpenSolaris build_snv_77 SPARC
  • Sun OpenSolaris build_snv_77 x86
  • Sun OpenSolaris build_snv_78 SPARC
  • Sun OpenSolaris build_snv_78 x86
  • Sun OpenSolaris build_snv_79 SPARC
  • Sun OpenSolaris build_snv_79 x86
  • Sun OpenSolaris build_snv_79b SPARC
  • Sun OpenSolaris build_snv_79b x86
  • Sun OpenSolaris build_snv_80 SPARC
  • Sun OpenSolaris build_snv_80 x86
  • Sun OpenSolaris build_snv_81 SPARC
  • Sun OpenSolaris build_snv_81 x86
  • Sun OpenSolaris build_snv_82 SPARC
  • Sun OpenSolaris build_snv_82 x86
  • Sun OpenSolaris build_snv_83 SPARC
  • Sun OpenSolaris build_snv_83 x86
  • Sun OpenSolaris build_snv_84 SPARC
  • Sun OpenSolaris build_snv_84 x86
  • Sun OpenSolaris build_snv_85 SPARC
  • Sun OpenSolaris build_snv_85 x86
  • Sun OpenSolaris build_snv_86 SPARC
  • Sun OpenSolaris build_snv_86 x86
  • Sun OpenSolaris build_snv_87 x86
  • Sun OpenSolaris build_snv_87 SPARC
  • Sun OpenSolaris build_snv_88 x86
  • Sun OpenSolaris build_snv_88 SPARC
  • Sun OpenSolaris build_snv_89 SPARC
  • Sun OpenSolaris build_snv_89 x86
  • Sun OpenSolaris build_snv_90 x86
  • Sun OpenSolaris build_snv_90 SPARC
  • Sun OpenSolaris build_snv_91 SPARC
  • Sun OpenSolaris build_snv_91 x86
  • Sun OpenSolaris build_snv_92 x86
  • Sun OpenSolaris build_snv_92 SPARC
  • Sun OpenSolaris build_snv_93 SPARC
  • Sun OpenSolaris build_snv_93 x86
  • Sun OpenSolaris build_snv_94 x86
  • Sun OpenSolaris build_snv_94 SPARC
  • Sun OpenSolaris build_snv_95 x86
  • Sun OpenSolaris build_snv_95 SPARC
  • Sun OpenSolaris build_snv_96 x86
  • Sun OpenSolaris build_snv_96 SPARC
  • Sun OpenSolaris build_snv_97 x86
  • Sun OpenSolaris build_snv_97 SPARC
  • Sun OpenSolaris build_snv_98 x86
  • Sun OpenSolaris build_snv_98 SPARC
  • Sun OpenSolaris build_snv_99 SPARC
  • Sun OpenSolaris build_snv_99 x86
  • Sun Solaris 10 SPARC
  • Sun Solaris 10 x86
  • Sun Solaris 9 x86
  • Sun Solaris 9 SPARC
  • SUSE SuSE Linux 9.0

Reported:

Jul 30, 2009

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page

* According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall IBM be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

About IBM Internet Security Systems

IBM Internet Security Systems is a trusted security advisor to thousands of the world's leading businesses and governments, helping to provide pre-emptive protection for networks, desktops and servers. The IBM Proventia? integrated security platform is designed to automatically protect against both known and unknown threats, helping to keep networks up and running and shield customers from online attacks before they impact business assets. IBM Internet Security Systems products and services are based on the proactive security intelligence of its X-Force? research and development team ? an unequivocal world authority in vulnerability and threat research. The IBM Internet Security Systems product line is also complemented by comprehensive Managed Security Services and Professional Security Services. For more information, visit the IBM Internet Security Systems Web site at www.iss.net or call 800-776-2362.