Secunia Security Advisory - Marcel Boesch has reported a vulnerability in Mozilla and Firefox, which can be exploited by malicious people to cause a denial of service. Versions affected: Mozilla 1.6, 1.7.x, and Firefox 0.x.
fba993b6d724a589100b57a880caeacb0e040dc3256bd64266d7c963296be1ce
TITLE:
Mozilla / Firefox Certificate Store Corruption Vulnerability
SECUNIA ADVISORY ID:
SA12076
VERIFY ADVISORY:
https://secunia.com/advisories/12076/
CRITICAL:
Less critical
IMPACT:
DoS
WHERE:
>From remote
SOFTWARE:
Mozilla 1.6
https://secunia.com/product/3101/
Mozilla 1.7.x
https://secunia.com/product/3691/
Mozilla Firefox 0.x
https://secunia.com/product/3256/
DESCRIPTION:
Marcel Boesch has reported a vulnerability in Mozilla and Firefox,
which can be exploited by malicious people to cause a DoS (Denial of
Service).
Arbitrary root certificates are imported silently without presenting
users with a import dialog box when the MIME type is specified as:
"application/x-x509-email-cert".
Due to another problem, this can e.g be exploited by malicious
websites or HTML-based emails to prevent users from accessing valid
SSL sites by placing invalid root certificates with the same DN
(Distinguished Name) as a valid root certificate in a user's
certificate store.
Successful exploitation prevents access to SSL-based sites that use a
trusted root certificate with the same DN as a malicious root
certificate in the user's certificate store.
The vulnerability has been reported in Mozilla 1.6, 1.7, and 1.7.1
for Windows and Linux, and in Mozilla Firefox 0.8 and 0.9.2. Other
versions may also be affected.
SOLUTION:
Don't visit untrusted websites.
Check the certificate store and delete untrusted certificates if an
error message is displayed with error code -8182 ("certificate
presented by [domain] is invalid or corrupt") when attempting to
access a SSL-based website.
Mozilla:
"Edit" -> "Preferences" -> "Privacy & Security" -> "Certificates" ->
"Manage Certificates..." -> "Authorities".
Firefox:
"Tools" -> "Options..." -> "Advanced" -> "Certificates" -> "Manage
Certificates..." -> "Authorities".
PROVIDED AND/OR DISCOVERED BY:
Marcel Boesch
ORIGINAL ADVISORY:
Marcel Boesch:
https://banquo.inf.ethz.ch:8080/
Mozilla Bug Tracking System:
https://bugzilla.mozilla.org/show_bug.cgi?id=249004
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
https://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
https://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------