Vulnerability Note VU#784278
Mozilla fails to validate the DN of X.509 certificates
Mozilla fails to verify that the Distinguished Name (DN) of an X.509 certificate is unique when importing it. A denial of service occurs when Mozilla imports a specially crafted, self-signed certificate that has the same DN as an existing Certificate Authority (CA) root certificate.
Mozilla version 1.7.1 and earlier can import a self-signed certificate with the same DN as an existing CA root certificate. When this occurs, the imported certificate will override the CA root certificate. Mozilla will return an error when attempting to create a secure connection to a website whose certificate is signed by a CA root certificate that has been overridden in this manner. A remote attacker can automate exploitation of this vulnerability using the "application/x-x509-email-cert" MIME type. This will permit Mozilla to import the certificate without any user intervention.
A remote attacker could cause a denial of service against the certificate store, preventing the user from accessing SSL websites.
This issue has been resolved in the following versions:
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Gentoo Linux||Affected||-||24 Aug 2004|
|Mozilla||Affected||-||23 Aug 2004|
CVSS Metrics (Learn More)
This was reported on the Mozilla Known Vulnerabilities List. Mozilla attributes this report to Marcel Boesch.
This document was written by Will Dormann.
- CVE IDs: CAN-2004-0758
- Date Public: 29 Jun 2004
- Date First Published: 23 Aug 2004
- Date Last Updated: 25 Aug 2004
- Severity Metric: 5.17
- Document Revision: 12
If you have feedback, comments, or additional information about this vulnerability, please send us email.