CVE-2004-0765
CVSS7.5
发布时间 :2004-08-18 00:00:00
修订时间 :2016-10-17 22:48:50
NMCOS    

[原文]The cert_TestHostName function in Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, only checks the hostname portion of a certificate when the hostname portion of the URI is not a fully qualified domain name (FQDN), which allows remote attackers to spoof trusted certificates.


[CNNVD]Mozilla Browser Non-FQDN SSL证书欺骗漏洞(CNNVD-200408-154)

        Mozilla 1.7之前版本, Firefox 0.9之前版本, 以及Thunderbird 0.7之前版本中的cert_TestHostName函数存在漏洞。该漏洞在URI的主机名部分不是完全合格的域名称(FQDN)时检查证书的主机名部分,远程攻击者可以欺骗受信任的证书。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:mozilla:mozilla:1.7Mozilla Mozilla 1.7
cpe:/a:mozilla:firefox:0.9Mozilla Firefox 0.9
cpe:/a:mozilla:thunderbird:0.7Mozilla Thunderbird 0.7

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:11162The cert_TestHostName function in Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, only checks the hostname portion of a ...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0765
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0765
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200408-154
(官方数据源) CNNVD

- 其它链接及资源

http://bugzilla.mozilla.org/show_bug.cgi?id=234058
(VENDOR_ADVISORY)  CONFIRM  http://bugzilla.mozilla.org/show_bug.cgi?id=234058
http://marc.info/?l=bugtraq&m=109900315219363&w=2
(UNKNOWN)  FEDORA  FLSA:2089
http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7
(UNKNOWN)  CONFIRM  http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7
http://www.novell.com/linux/security/advisories/2004_36_mozilla.html
(VENDOR_ADVISORY)  SUSE  SUSE-SA:2004:036
http://www.redhat.com/support/errata/RHSA-2004-421.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2004:421
http://xforce.iss.net/xforce/xfdb/16868
(UNKNOWN)  XF  mozilla-certtesthostname-certificate-spoof(16868)

- 漏洞信息

Mozilla Browser Non-FQDN SSL证书欺骗漏洞
高危 设计错误
2004-08-18 00:00:00 2005-10-20 00:00:00
远程  
        Mozilla 1.7之前版本, Firefox 0.9之前版本, 以及Thunderbird 0.7之前版本中的cert_TestHostName函数存在漏洞。该漏洞在URI的主机名部分不是完全合格的域名称(FQDN)时检查证书的主机名部分,远程攻击者可以欺骗受信任的证书。

- 公告与补丁

        Conectiva has released an advisory (CLA-2004:877) to address various issues including this issue in Mozilla. This advisory contains updated Mozilla packages (1.7.3) for Conectiva Linux 9 and 10. Please see the referenced advisory for more information.
        SCO has released an advisory SCOSA-2005.25 including updated packages to address this issue. Please see the referenced advisory for more information.
        Red Hat has released advisory RHSA-2004:421-17 and fixes to address this issue on Red Hat Linux Enterprise platforms. Customers who are affected by this issue are advised to apply the appropriate updates. Customers subscribed to the Red Hat Network may apply the appropriate fixes using the Red Hat Update Agent (up2date). Please see referenced advisory for additional information.
        The vendor has released an upgrade dealing with this issue.
        Avaya has released an advisory that acknowledges this vulnerability for Avaya products. Fixes are not currently available; customers are advised to contact the vendor for further details regarding fix availability. Please see the referenced Avaya advisory at the following location for further details:
        http://support.avaya.com/japple/css/japple?temp.groupID=128450&temp.selectedFamily=128451&temp.selectedProduct=154235&temp.selectedBucket=126655&temp.feedbackState=askForFeedback&temp.documentID=198527&PAGE=avaya.css.CSSLvl1Detail&executeTransaction=avaya.css.UsageUpdate()
        Slackware has released an advisory (SSA:2004-223-01) to address this issue. Please see the referenced advisory for more information.
        Mandrake Linux has released advisory MDKSA-2004:082 along with fixes addressing this issue. Please see the referenced advisory for further information.
        SGI has made available Patch 10095, correcting this vulnerability for systems running SGI Advanced Linux Environment 3:
        Patch 10095 is available from
        http://support.sgi.com/ and
        ftp://patches.sgi.com/support/free/security/patches/ProPack/3/
        The individual RPMs from Patch 10095 are available from:
        ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/RPMS
        ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/SRPMS
        SuSE Linux has released advisory SUSE-SA:2004:036 along with fixes dealing with this issue. Please see the referenced advisory for more information.
        The Fedora Legacy project has released advisory FLSA-2004:2089 along with fixes to address multiple issues in RedHat Fedora Core 1, and RedHat Linux 7.3 and 9.0. Please see the referenced advisory for further information.
        Mozilla Thunderbird 0.6
        
        Mozilla Thunderbird 0.7
        
        Mozilla Thunderbird 0.7.1
        
        Mozilla Thunderbird 0.7.2
        
        Mozilla Firefox 0.8
        
        Mozilla Firefox 0.9
        
        Mozilla Firefox 0.9 rc
        
        Mozilla Firefox 0.9.1
        
        Mozilla Firefox 0.9.2
        
        Mozilla Browser 1.0 RC1
        
        Mozilla Browser 1.0 RC2
        
        Mozilla Browser 1.0
        
        Mozilla Browser 1.0.1
        
        Mozilla Browser 1.0.2
        
        Mozilla Browser 1.1
        
        Mozilla Browser 1.1 Alpha
        
        Mozilla Browser 1.1 Beta
        
        Mozilla Browser 1.2 Alpha
        
        Mozilla Browser 1.2
        
        Mozilla Browser 1.2 Beta
        
        Mozilla Browser 1.2.1
        

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站