CVE-2014-1492

Priority
Description
The cert_TestHostName function in lib/certdb/certdb.c in the
certificate-checking implementation in Mozilla Network Security Services
(NSS) before 3.16 accepts a wildcard character that is embedded in an
internationalized domain name's U-label, which might allow
man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
Assigned-to
chrisccoulson
Notes
jdstrandThunderbird 24.5 has nss 3.15.4
Package
Upstream:needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [uses system nss])
Package
Upstream:released (29.0)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [29.0+build1-0ubuntu0.14.04.2])
Package
Source: nss (LP Ubuntu Debian)
Upstream:released (3.16)
Ubuntu 14.04 ESM (Trusty Tahr):released (2:3.15.4-1ubuntu7)
Patches:
Upstream:https://hg.mozilla.org/projects/nss/rev/15ea62260c21
Upstream:https://hg.mozilla.org/projects/nss/rev/2ffa40a3ff55
Upstream:https://hg.mozilla.org/projects/nss/rev/709d4e597979
Package
Upstream:needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [uses system nss])
Package
Priority: Low
Upstream:needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected)
More Information

Updated: 2020-09-10 02:56:16 UTC (commit 81a23a978c4436cd99e1d040e9e73e9146876281)