[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1874 nss -- several vulnerabilities

ID: oval:org.mitre.oval:def:8111Date: (C)2009-12-15   (M)2024-02-19
Class: PATCHFamily: unix




Several vulnerabilities have been discovered in the Network Security Service libraries. The Common Vulnerabilities and Exposures project identifies the following problems: Moxie Marlinspike discovered that a buffer overflow in the regular expression parser could lead to the execution of arbitrary code. Dan Kaminsky discovered that NULL characters in certificate names could lead to man-in-the-middle attacks by tricking the user into accepting a rogue certificate. Certificates with MD2 hash signatures are no longer accepted since they're no longer considered cryptograhically secure. The old stable distribution (etch) doesn't contain nss.

Platform:
Debian 5.0
Product:
nss
Reference:
DSA-1874
CVE-2009-2404
CVE-2009-2408
CVE-2009-2409
CVE    3
CVE-2009-2409
CVE-2009-2404
CVE-2009-2408
CPE    1
cpe:/o:debian:debian_linux:5.x

© SecPod Technologies