CVE-2010-3170

NameCVE-2010-3170
DescriptionMozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-2123-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
nss (PTS)bullseye (security), bullseye2:3.61-1+deb11u3fixed
bookworm2:3.87.1-1fixed
trixie2:3.103-1fixed
sid2:3.105-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kde4libssourcesqueeze4:4.4.5-2+squeeze2
kde4libssource(unstable)4:4.4.5-4low
nsssourcelenny3.12.3.1-0lenny2DSA-2123-1
nsssource(unstable)3.12.8-1
qt4-x11sourcelenny(not affected)
qt4-x11sourcesqueeze4:4.6.3-4+squeeze1
qt4-x11source(unstable)4:4.7.2-4low

Notes

[lenny] - qt4-x11 <not-affected> (Vulnerable code not present)
[lenny] - kde4libs <no-dsa> (Minor issue)

Search for package or bug name: Reporting problems