Name | CVE-2009-2404 |
Description | Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-1874-1, DSA-2025-1 |
Debian Bugs | 539934 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
nss (PTS) | bullseye (security), bullseye | 2:3.61-1+deb11u3 | fixed |
bookworm | 2:3.87.1-1 | fixed | |
sid, trixie | 2:3.105-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
icedove | source | lenny | 2.0.0.24-0lenny1 | DSA-2025-1 | ||
icedove | source | (unstable) | 2.0.0.24-1 | low | ||
nss | source | lenny | 3.12.3.1-0lenny1 | DSA-1874-1 | ||
nss | source | (unstable) | 3.12.3-1 | low | 539934 |