CVE-2008-2809

NameCVE-2008-2809
DescriptionMozilla 1.9 M8 and earlier, Mozilla Firefox 2 before 2.0.0.15, SeaMonkey 1.1.5 and other versions before 1.1.10, Netscape 9.0, and other Mozilla-based web browsers, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regard the certificate as also accepted for all domain names in subjectAltName:dNSName fields, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-1607-1, DSA-1615-1, DSA-1621-1, DSA-1697-1

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
iceapesourceetch1.0.13~pre080614i-0etch1DSA-1697-1
iceapesource(unstable)1.1.10-1
icedovesourceetch1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1DSA-1621-1
icedovesource(unstable)2.0.0.16-1
iceweaselsourceetch2.0.0.15-0etch1DSA-1607-1
iceweaselsource(unstable)3.0
xulrunnersourceetch1.8.0.15~pre080614d-0etch1DSA-1615-1
xulrunnersource(unstable)1.9.0.1-1

Notes

Firefox 3 not affected

Search for package or bug name: Reporting problems