The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.
References
Configurations
Configuration 1 (hide)
|
History
27 Mar 2025, 14:01
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mozilla:nss:3.7:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.8.1a1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.0.25:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.5.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.4.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.7.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.1.22:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.1.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.14:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.11:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.3.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.3.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.4.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.11.7:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.8:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.11.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.1.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.1.16:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.0.22:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.16:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.6:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.5.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.3.3:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.7:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.0.19:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.4.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.3:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.6.2:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.1.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:*:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.2.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.12.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.2:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.9:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.3.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.2.3:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.4.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.6.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.4.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.3.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.6.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.5.3:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.0.3:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.0.23:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.19:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.2.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.5.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.8:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.1.3:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.0.21:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.6.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.0.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.1.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.1.21:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.6.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.7:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.1.8:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.17:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.7.3:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.0.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.0.16:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.1.7:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.1.20:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.3.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.1.15:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.0.20:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.9:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.13:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.7.7:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.3.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.1.6:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.1.13:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.11:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.7.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.2.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.7.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.1.17:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.3.0:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.4.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.5.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.9:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.9.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.4.1:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.11.8:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.0.24:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.1.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.11.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.6:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.2.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.6:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.0.17:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.6.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.10:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.1.19:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.0.18:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.9:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.0.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.0.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.10:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.7.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.12:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.11:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.8:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.6.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.12:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.4.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.6.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.4.0:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.3:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.4.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.2.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.1.18:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.2.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.6:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.10:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.18:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.3.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.8:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.4.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.15:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.7.7:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.10:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.1.23:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.4.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.1.14:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:2.5.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:1.5.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:nss:3.3:*:*:*:*:*:*:* |
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:* |
References | () http://java.sun.com/javase/6/webnotes/6u17.html - Release Notes | |
References | () http://secunia.com/advisories/36669 - Not Applicable | |
References | () http://secunia.com/advisories/36739 - Not Applicable | |
References | () http://secunia.com/advisories/37386 - Not Applicable | |
References | () http://secunia.com/advisories/42467 - Not Applicable | |
References | () http://security.gentoo.org/glsa/glsa-200911-02.xml - Third Party Advisory | |
References | () http://security.gentoo.org/glsa/glsa-200912-01.xml - Third Party Advisory | |
References | () http://support.apple.com/kb/HT3937 - Broken Link | |
References | () http://www.debian.org/security/2009/dsa-1874 - Mailing List | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:197 - Not Applicable | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:216 - Not Applicable | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:258 - Not Applicable | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2010:084 - Not Applicable | |
References | () http://www.redhat.com/support/errata/RHSA-2009-1207.html - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2009-1432.html - Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/515055/100/0/threaded - Broken Link | |
References | () http://www.securitytracker.com/id?1022631 - Broken Link | |
References | () http://www.ubuntu.com/usn/usn-810-1 - Third Party Advisory | |
References | () http://www.vmware.com/security/advisories/VMSA-2010-0019.html - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2409 - Third Party Advisory | |
References | () https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html - Third Party Advisory | |
References | () https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html - Third Party Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10763 - Broken Link | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6631 - Broken Link | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7155 - Broken Link | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8594 - Broken Link | |
References | () https://rhn.redhat.com/errata/RHSA-2010-0095.html - Third Party Advisory | |
References | () https://usn.ubuntu.com/810-2/ - Broken Link | |
References | () https://www.debian.org/security/2009/dsa-1888 - Mailing List, Third Party Advisory | |
First Time |
Mozilla network Security Services
|
|
CWE | CWE-295 |
21 Nov 2024, 01:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://java.sun.com/j2se/1.5.0/ReleaseNotes.html - Patch | |
References | () http://java.sun.com/javase/6/webnotes/6u17.html - | |
References | () http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html - Vendor Advisory | |
References | () http://secunia.com/advisories/36139 - Vendor Advisory | |
References | () http://secunia.com/advisories/36157 - Vendor Advisory | |
References | () http://secunia.com/advisories/36434 - Vendor Advisory | |
References | () http://secunia.com/advisories/36669 - | |
References | () http://secunia.com/advisories/36739 - Vendor Advisory | |
References | () http://secunia.com/advisories/37386 - Vendor Advisory | |
References | () http://secunia.com/advisories/42467 - Vendor Advisory | |
References | () http://security.gentoo.org/glsa/glsa-200911-02.xml - | |
References | () http://security.gentoo.org/glsa/glsa-200912-01.xml - | |
References | () http://support.apple.com/kb/HT3937 - | |
References | () http://www.debian.org/security/2009/dsa-1874 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:197 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:216 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:258 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2010:084 - | |
References | () http://www.redhat.com/support/errata/RHSA-2009-1207.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2009-1432.html - | |
References | () http://www.securityfocus.com/archive/1/515055/100/0/threaded - | |
References | () http://www.securitytracker.com/id?1022631 - | |
References | () http://www.ubuntu.com/usn/usn-810-1 - | |
References | () http://www.vmware.com/security/advisories/VMSA-2010-0019.html - | |
References | () http://www.vupen.com/english/advisories/2009/2085 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2009/3184 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/3126 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2409 - | |
References | () https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html - | |
References | () https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10763 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6631 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7155 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8594 - | |
References | () https://rhn.redhat.com/errata/RHSA-2010-0095.html - | |
References | () https://usn.ubuntu.com/810-2/ - | |
References | () https://www.debian.org/security/2009/dsa-1888 - |
Information
Published : 2009-07-30 19:30
Updated : 2025-03-27 14:01
NVD link : CVE-2009-2409
Mitre link : CVE-2009-2409
CVE.ORG link : CVE-2009-2409
JSON object : View
Products Affected
mozilla
- network_security_services
gnu
- gnutls
openssl
- openssl
CWE
CWE-295
Improper Certificate Validation