CVE-2009-2409

critical

Description

The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.

References

https://www.debian.org/security/2009/dsa-1888

https://usn.ubuntu.com/810-2/

https://rhn.redhat.com/errata/RHSA-2010-0095.html

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8594

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7155

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6631

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10763

https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html

https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2409

http://www.vupen.com/english/advisories/2010/3126

http://www.vupen.com/english/advisories/2009/3184

http://www.vupen.com/english/advisories/2009/2085

http://www.vmware.com/security/advisories/VMSA-2010-0019.html

http://www.ubuntu.com/usn/usn-810-1

http://www.securitytracker.com/id?1022631

http://www.securityfocus.com/archive/1/515055/100/0/threaded

http://www.redhat.com/support/errata/RHSA-2009-1432.html

http://www.redhat.com/support/errata/RHSA-2009-1207.html

http://www.mandriva.com/security/advisories?name=MDVSA-2010:084

http://www.mandriva.com/security/advisories?name=MDVSA-2009:258

http://www.mandriva.com/security/advisories?name=MDVSA-2009:216

http://www.mandriva.com/security/advisories?name=MDVSA-2009:197

http://www.debian.org/security/2009/dsa-1874

http://support.apple.com/kb/HT3937

http://security.gentoo.org/glsa/glsa-200912-01.xml

http://security.gentoo.org/glsa/glsa-200911-02.xml

http://secunia.com/advisories/42467

http://secunia.com/advisories/37386

http://secunia.com/advisories/36739

http://secunia.com/advisories/36669

http://secunia.com/advisories/36434

http://secunia.com/advisories/36157

http://secunia.com/advisories/36139

http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html

http://java.sun.com/javase/6/webnotes/6u17.html

http://java.sun.com/j2se/1.5.0/ReleaseNotes.html

Details

Source: Mitre, NVD

Published: 2009-07-30

Updated: 2023-11-07

Risk Information

CVSS v2

Base Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical