Description
Mozilla 1.9 M8 and earlier, Mozilla Firefox 2 before 2.0.0.15, SeaMonkey 1.1.5 and other versions before 1.1.10, Netscape 9.0, and other Mozilla-based web browsers, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regard the certificate as also accepted for all domain names in subjectAltName:dNSName fields, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.
CVSS Metrics
- Vector
- AV:N/AC:H/Au:N/C:N/I:P/A:P
- Access Vector
- network
- Access Cmplx
- high
- Auth
- none
- Confidentiality
- none
- Integrity
- partial
- Availability
- partial
- Weaknesses
- CWE-20
Metadata
- Primary Vendor
- MOZILLA
- Published
- 7/8/2008
- Last Modified
- 4/9/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
mozilla : firefoxmozilla : firefoxmozilla : firefoxmozilla : firefoxmozilla : firefoxmozilla : firefoxmozilla : firefoxmozilla : firefoxmozilla : firefoxmozilla : firefoxmozilla : firefoxmozilla : firefoxmozilla : firefoxmozilla : firefoxmozilla : geckbmozilla : seamonkeymozilla : seamonkeynetscape : navigator
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.