Description
Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before
3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a
wildcard IP address in the subject's Common Name field of an X.509
certificate, which might allow man-in-the-middle attackers to spoof
arbitrary SSL servers via a crafted certificate issued by a legitimate
Certification Authority.
Notes
jdstrand> real problem but with very unlikely circumstances
jdstrand> needs new NSPR
Package
Upstream: | released
(4.8.6)
|
Package
Upstream: | released
(3.12.8)
|
Updated: 2019-01-14 21:53:46 UTC (commit 51f9b73af244ba86b9321e46e526586c25a8e060)