Search for vulnerabilities
Vulnerability details: VCID-muaw-2j74-aaar
Vulnerability ID VCID-muaw-2j74-aaar
Aliases CVE-2009-2404
Summary Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
rhas Critical https://access.redhat.com/errata/RHSA-2009:1184
rhas Critical https://access.redhat.com/errata/RHSA-2009:1185
rhas Critical https://access.redhat.com/errata/RHSA-2009:1186
rhas Critical https://access.redhat.com/errata/RHSA-2009:1190
rhas Critical https://access.redhat.com/errata/RHSA-2009:1207
epss 0.20446 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.21024 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.38016 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.38016 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.38016 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.38016 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.60445 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.60445 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.60445 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.60445 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.60445 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.60445 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.60445 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.60445 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.60445 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.60445 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.60445 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
epss 0.60445 https://api.first.org/data/v1/epss?cve=CVE-2009-2404
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=512912
cvssv2 9.3 https://nvd.nist.gov/vuln/detail/CVE-2009-2404
generic_textual critical https://www.mozilla.org/en-US/security/advisories/mfsa2009-43
Reference id Reference type URL
http://rhn.redhat.com/errata/RHSA-2009-1185.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2404.json
https://api.first.org/data/v1/epss?cve=CVE-2009-2404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2404
http://secunia.com/advisories/36088
http://secunia.com/advisories/36102
http://secunia.com/advisories/36125
http://secunia.com/advisories/36139
http://secunia.com/advisories/36157
http://secunia.com/advisories/36434
http://secunia.com/advisories/37098
http://secunia.com/advisories/39428
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11174
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8658
http://sunsolve.sun.com/search/document.do?assetkey=1-66-273910-1
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021030.1-1
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021699.1-1
https://usn.ubuntu.com/810-2/
http://www.blackhat.com/presentations/bh-usa-09/MARLINSPIKE/BHUSA09-Marlinspike-DefeatSSL-SLIDES.pdf
http://www.debian.org/security/2009/dsa-1874
http://www.mandriva.com/security/advisories?name=MDVSA-2009:197
http://www.mandriva.com/security/advisories?name=MDVSA-2009:216
http://www.mozilla.org/security/announce/2009/mfsa2009-43.html
http://www.novell.com/linux/security/advisories/2009_48_firefox.html
http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html
http://www.redhat.com/support/errata/RHSA-2009-1207.html
http://www.securityfocus.com/bid/35891
http://www.ubuntu.com/usn/usn-810-1
http://www.us-cert.gov/cas/techalerts/TA10-103B.html
http://www.vupen.com/english/advisories/2009/2085
512912 https://bugzilla.redhat.com/show_bug.cgi?id=512912
539934 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539934
CVE-2009-2404 https://nvd.nist.gov/vuln/detail/CVE-2009-2404
GLSA-201301-01 https://security.gentoo.org/glsa/201301-01
mfsa2009-43 https://www.mozilla.org/en-US/security/advisories/mfsa2009-43
RHSA-2009:1184 https://access.redhat.com/errata/RHSA-2009:1184
RHSA-2009:1185 https://access.redhat.com/errata/RHSA-2009:1185
RHSA-2009:1186 https://access.redhat.com/errata/RHSA-2009:1186
RHSA-2009:1190 https://access.redhat.com/errata/RHSA-2009:1190
RHSA-2009:1207 https://access.redhat.com/errata/RHSA-2009:1207
USN-810-1 https://usn.ubuntu.com/810-1/
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2009-2404
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.92751
EPSS Score 0.20446
Published At March 29, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.