Korean
<< Back
VID 28638
Severity 30
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Mozilla/Firefox Web browser, according to its version number, contains a Certificate Handling Denial of Service Vulnerability.
Mozilla and Firefox are open-source Web browsers, developed by the Mozilla project. Mozilla version 1.7.1 and earlier, and Firefox versions 0.9.2 and earlier are vulnerable to a Denial of Service Vulnerability in the importing of certificates, caused by a failure to verify that the Distinguished Name (DN) of an X.509 certificate is unique when importing it. By overwriting a malicious Certificate with the same Distinguished Name (DN) as a built-in root Certificate Authority (CA) certificate into an existing CA root certificate on the target system, a remote attacker could prevent the target user from gaining access to a legitimate Secure Sockets Layer (SSL) Web site.

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.kb.cert.org/vuls/id/784278
http://securitytracker.com/alerts/2004/Jul/1010714.html

* Platforms Affected:
Mozilla Project, Mozilla 1.7.1 and earlier
Mozilla Project, Firefox 0.9.2 and earlier
Microsoft Windows Any version
Unix Any version
Linux Any version
Recommendation For Mozilla Firefox:
Upgrade to the latest version (Firefox 0.9.3 or later), available from Mozilla Firefox web site at http://www.mozilla.org/products/firefox

For Mozilla Suite:
Upgrade to the latest version (Mozilla 1.7.2 or later), available from Mozilla Browser web site at http://www.mozilla.org/products/mozilla1.x/

For Red Hat Linux:
Upgrade to the latest mozilla package, as listed in Red Hat Security Advisory RHSA-2004:421-17 at https://rhn.redhat.com/errata/RHSA-2004-421.html

For Slackware Linux:
Upgrade to the latest mozilla package, as listed in slackware-security Mailing List, Tue, 10 Aug 2004 14:17:12 -0700 (PDT) at http://slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.667659

For Gentoo Linux:
Upgrade to the latest version of mozilla, as listed in Gentoo Linux Security Advisory GLSA 200408-22 at http://www.gentoo.org/security/en/glsa/glsa-200408-22.Æ·

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2004-0758 (CVE)
Related URL 10703 (SecurityFocus)
Related URL 16706 (ISS)