The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) before 3.16 accepts a wildcard character that is embedded in an internationalized domain name's U-label, which might allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "29.0+build1-0ubuntu0.14.04.2",
"binary_name": "firefox"
},
{
"binary_version": "29.0+build1-0ubuntu0.14.04.2",
"binary_name": "firefox-dev"
},
{
"binary_version": "29.0+build1-0ubuntu0.14.04.2",
"binary_name": "firefox-globalmenu"
},
{
"binary_version": "29.0+build1-0ubuntu0.14.04.2",
"binary_name": "firefox-mozsymbols"
},
{
"binary_version": "29.0+build1-0ubuntu0.14.04.2",
"binary_name": "firefox-testsuite"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "2:3.15.4-1ubuntu7",
"binary_name": "libnss3"
},
{
"binary_version": "2:3.15.4-1ubuntu7",
"binary_name": "libnss3-1d"
},
{
"binary_version": "2:3.15.4-1ubuntu7",
"binary_name": "libnss3-dev"
},
{
"binary_version": "2:3.15.4-1ubuntu7",
"binary_name": "libnss3-nssdb"
},
{
"binary_version": "2:3.15.4-1ubuntu7",
"binary_name": "libnss3-tools"
}
]
}