Lucene search

K
nvd[email protected]NVD:CVE-2014-1492
HistoryMar 25, 2014 - 1:25 p.m.

CVE-2014-1492

2014-03-2513:25:38
CWE-20
web.nvd.nist.gov
1

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

7.1 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.1%

The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) before 3.16 accepts a wildcard character that is embedded in an internationalized domain name’s U-label, which might allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate.

Affected configurations

NVD
Node
mozillanetwork_security_servicesRange3.15.5
OR
mozillanetwork_security_servicesMatch3.2
OR
mozillanetwork_security_servicesMatch3.2.1
OR
mozillanetwork_security_servicesMatch3.3
OR
mozillanetwork_security_servicesMatch3.3.1
OR
mozillanetwork_security_servicesMatch3.3.2
OR
mozillanetwork_security_servicesMatch3.4
OR
mozillanetwork_security_servicesMatch3.4.1
OR
mozillanetwork_security_servicesMatch3.4.2
OR
mozillanetwork_security_servicesMatch3.5
OR
mozillanetwork_security_servicesMatch3.6
OR
mozillanetwork_security_servicesMatch3.6.1
OR
mozillanetwork_security_servicesMatch3.7
OR
mozillanetwork_security_servicesMatch3.7.1
OR
mozillanetwork_security_servicesMatch3.7.2
OR
mozillanetwork_security_servicesMatch3.7.3
OR
mozillanetwork_security_servicesMatch3.7.5
OR
mozillanetwork_security_servicesMatch3.7.7
OR
mozillanetwork_security_servicesMatch3.8
OR
mozillanetwork_security_servicesMatch3.9
OR
mozillanetwork_security_servicesMatch3.11.2
OR
mozillanetwork_security_servicesMatch3.11.3
OR
mozillanetwork_security_servicesMatch3.11.4
OR
mozillanetwork_security_servicesMatch3.11.5
OR
mozillanetwork_security_servicesMatch3.12
OR
mozillanetwork_security_servicesMatch3.12.1
OR
mozillanetwork_security_servicesMatch3.12.2
OR
mozillanetwork_security_servicesMatch3.12.3
OR
mozillanetwork_security_servicesMatch3.12.3.1
OR
mozillanetwork_security_servicesMatch3.12.3.2
OR
mozillanetwork_security_servicesMatch3.12.4
OR
mozillanetwork_security_servicesMatch3.12.5
OR
mozillanetwork_security_servicesMatch3.12.6
OR
mozillanetwork_security_servicesMatch3.12.7
OR
mozillanetwork_security_servicesMatch3.12.8
OR
mozillanetwork_security_servicesMatch3.12.9
OR
mozillanetwork_security_servicesMatch3.12.10
OR
mozillanetwork_security_servicesMatch3.12.11
OR
mozillanetwork_security_servicesMatch3.14
OR
mozillanetwork_security_servicesMatch3.14.1
OR
mozillanetwork_security_servicesMatch3.14.2
OR
mozillanetwork_security_servicesMatch3.14.3
OR
mozillanetwork_security_servicesMatch3.14.4
OR
mozillanetwork_security_servicesMatch3.14.5
OR
mozillanetwork_security_servicesMatch3.15
OR
mozillanetwork_security_servicesMatch3.15.1
OR
mozillanetwork_security_servicesMatch3.15.2
OR
mozillanetwork_security_servicesMatch3.15.3
OR
mozillanetwork_security_servicesMatch3.15.3.1
OR
mozillanetwork_security_servicesMatch3.15.4

References

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

7.1 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.1%