The crypto object and generateCRMFRequest()
The crypto object is used to provide services related to cryptography, such as handling digital certificates. The generateCRMFRequest() routine is used to generate keys for digital certificates.
A remote attacker may be able to execute arbitrary code with the privileges of the compromised user.
Red Hat, Inc.
This vulnerability was reported in Mozilla Foundation Security Advisory 2006-24 . Mozilla credits shutdown with providing information regarding this issue.
|Date First Published:||2006-04-17|
|Date Last Updated:||2007-02-02 15:21 UTC|