The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) before 3.16 accepts a wildcard character that is embedded in an internationalized domain name's U-label, which might allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "firefox", "binary_version": "29.0+build1-0ubuntu0.14.04.2" }, { "binary_name": "firefox-dev", "binary_version": "29.0+build1-0ubuntu0.14.04.2" }, { "binary_name": "firefox-globalmenu", "binary_version": "29.0+build1-0ubuntu0.14.04.2" }, { "binary_name": "firefox-mozsymbols", "binary_version": "29.0+build1-0ubuntu0.14.04.2" }, { "binary_name": "firefox-testsuite", "binary_version": "29.0+build1-0ubuntu0.14.04.2" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libnss3", "binary_version": "2:3.15.4-1ubuntu7" }, { "binary_name": "libnss3-1d", "binary_version": "2:3.15.4-1ubuntu7" }, { "binary_name": "libnss3-dev", "binary_version": "2:3.15.4-1ubuntu7" }, { "binary_name": "libnss3-nssdb", "binary_version": "2:3.15.4-1ubuntu7" }, { "binary_name": "libnss3-tools", "binary_version": "2:3.15.4-1ubuntu7" } ] }