VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
VRDA-090821-001     ( CVE-2009-2408 )
Mozilla Thunderbird 2.0.0.23 リリースノート
http://mozilla.jp/thunderbird/2.0.0.23/releasenotes/

SSL で保護された通信の情報漏えいの問題が修正されました。




About This Analysis Information
Analysis Information Provider:
JPCERT/CC
First Published:
2009-08-21
Source Information Category:
Advisory, Alert
Last Updated:
2009-08-21




Affected Product Tags
cpe:/a:mozilla:thunderbird     (Mozilla Thunderbird)
 


Vulnerability Analysis Results
[Information Source Reliability] [?]
Low [?]

Medium [?]
X High [?]

[Impact Level] [?]
Low [?]

X Low-Medium [?]
Medium-High [?]
High [?]

[Access Required] [?]
Physical [?]

Local [?]
Non-routed [?]
X Routed [?]

[Authentication] [?]
Privileged [?]

Standard [?]
Limited [?]
X None or Unnecessary [?]

[User Interaction Required] [?]
Complex [?]

X Simple [?]
None [?]

[Technical Difficulty] [?]
High [?]

Medium-High [?]
Low-Medium [?]
Low [?]

[Availability of Remediation] [?]
X Official Patch [?]

Official Workaround [?]
Unofficial Patch [?]
None [?]

[Incident Activity] [?]
X None [?]

Exploit or PoC [?]
Activity Observed [?]

Alternatives
Common Vulnerabilities and Exposures (CVE) CVE-2009-2408
Mozilla Firefox before 3.5 and NSS before 3.12.3 do not properlyhandle a '\0' character in a domain name in the subject's Common Name(CN) field of an X.509 certificate, which allows man-in-the-middleattackers to spoof arbitrary SSL servers via a crafted certificateissued by a legitimate Certification Authority.








References

Copyright © 2009 JPCERT/CC All Rights Reserved.