SSL: Mozilla Network Security Services Regexp Heap Overflow

This signature detects attempts to exploit a known vulnerability in Mozilla Network Security Services. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the client.

Extended Description

Mozilla Firefox and Seamonkey are prone to a heap-based buffer-overflow vulnerability in the regular expression parser used to match common names in SSL certificates. Successfully exploiting this issue can allow attackers to execute arbitrary code in the context of the application. Failed attempts will likely cause denial-of-service conditions. Note that attackers need to exploit this issue with a crafted certificate that SeaMonkey trusts; otherwise, a warning message will be presented to the user. SeaMonkey 1.09 and Firefox 3.0.x are vulnerable; other versions may also be affected. This issue is related to the vulnerability described by BID 35888 (Mozilla Firefox NULL Character CA SSL Certificate Validation Security Bypass Vulnerability).

Affected Products

Suse suse_linux_enterprise_desktop

References

BugTraq: 35891

CVE: CVE-2009-2404

Short Name
SSL:VULN:MOZILLA-NSS-REG
Severity
Major
Recommended
False
Recommended Action
Drop
Category
SSL
Keywords
CVE-2009-2404 Heap Mozilla Network Overflow Regexp Security Services bid:35891
Release Date
09/29/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Red_hat

Suse

Sun

Mozilla

Avaya

Pardus

Slackware

Ubuntu

Mandriva

Debian

Vmware

CVSS Score

9.3

Found a potential security threat?