VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : 脆弱性脅威分析用情報の定型データ配信
[ about VRDA Feed | JPCERT/CC



 
分析対象脆弱性情報 (リビジョン番号 : 1) [ Download XML
VRDA-090804-003     ( CVE-2009-2404 | CVE-2009-2408 | CVE-2009-2470 | CVE-2009-2654 )
Firefox 3.5.2 リリースノート
http://mozilla.jp/firefox/3.5.2/releasenotes/

Firefox 3.5.2 では、いくつかのセキュリティ問題 が修正されました。




この情報について
分析情報提供元:
JPCERT/CC
初版公開日:
2009-08-04
分析対象脆弱性情報の分類:
アドバイザリ・注意喚起
最終更新日:
2009-08-04




脆弱性の影響を受ける製品の識別子
cpe:/a:mozilla:firefox     (Mozilla Firefox)
 


脆弱性の分析内容
[分析に利用した情報の信頼性] [?]
 [?]

 [?]
X [?]

[影響の大きさ] [?]
 [?]

小~中 [?]
中~大 [?]
X [?]

[攻撃経路] [?]
物理アクセス [?]

ローカルマシン上 [?]
同一セグメント上 [?]
X インターネット経由 [?]

[認証レベル] [?]
管理者アカウント [?]

一般ユーザアカウント [?]
フリーアカウント [?]
X 不要 [?]

[攻撃成立に必要なユーザの関与] [?]
複雑 [?]

X 簡単 [?]
不要 [?]

[攻撃の難易度] [?]
 [?]

中~高 [?]
低~中 [?]
 [?]

[対策の有無] [?]
X 公式パッチ有り [?]

公式回避策有り [?]
非公式回避策・パッチ有り [?]
なし [?]

[インシデントの発生状況] [?]
X 活動なし [?]

Exploit/PoCあり [?]
活動あり [?]

関連情報
Common Vulnerabilities and Exposures (CVE) CVE-2009-2404
Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.




Common Vulnerabilities and Exposures (CVE) CVE-2009-2408
Mozilla Firefox before 3.5 and NSS before 3.12.3 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.




Common Vulnerabilities and Exposures (CVE) CVE-2009-2470




Common Vulnerabilities and Exposures (CVE) CVE-2009-2654
Mozilla Firefox 3.5.1 and earlier allows remote attackers to spoof the address bar, and possibly conduct phishing attacks, via a crafted web page that calls window.open with an invalid character in the URL, makes document.write calls to the resulting object, and then calls the stop method during the loading of the error page.








参考情報

Copyright © 2009 JPCERT/CC All Rights Reserved.