Richard Moore and Simon Ward reported flaws in the way browsers such as Firefox handled wildcard characters in the Common Name field of a certificate. If an attacker is able to get a carefully-crafted certificate, signed by a Certificate Authority trusted by Firefox, the attacker could use the certificate during the man-in-the-middle attack and potentially confuse Firefox into accepting it by mistake. Different vulnerability than CVE-2009-2408. References: [1] http://www.westpoint.ltd.uk/advisories/wp-10-0001.txt [2] http://bugs.gentoo.org/show_bug.cgi?id=335731
This will be fixed in NSS 3.12.8
Mozilla has assigned CVE-2010-3170 identifier to this issue. Mozilla upstream bug: [3] https://bugzilla.mozilla.org/show_bug.cgi?id=578697 (not public yet)
(In reply to comment #2) > Mozilla upstream bug: > [3] https://bugzilla.mozilla.org/show_bug.cgi?id=578697 (not public yet) The bug is referenced in the comment for the following upstream CVS commit: http://bonsai.mozilla.org/cvsview2.cgi?diff_mode=context&whitespace_mode=show&subdir=mozilla/security/nss/lib/certdb&command=DIFF_FRAMESET&file=certdb.c&rev1=1.107&rev2=1.108&root=/cvsroot
This issue has been addressed in following products: Red Hat Enterprise Linux 3 Red Hat Enterprise Linux 4 Via RHSA-2010:0781 https://rhn.redhat.com/errata/RHSA-2010-0781.html
This issue has been addressed in following products: Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 5 Via RHSA-2010:0782 https://rhn.redhat.com/errata/RHSA-2010-0782.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2010:0862 https://rhn.redhat.com/errata/RHSA-2010-0862.html