First published: Mon Mar 24 2014(Updated: )
In a wildcard certificate, the wildcard character should not be embedded within the U-label of an internationalized domain name. This was not properly implemented in NSS, as a result it did not handle IDNA domain prefixes according to RFC 6125, section 6.4.3 "Checking of Wildcard Certificates". <a href="http://tools.ietf.org/html/rfc6125#section-6.4.3">http://tools.ietf.org/html/rfc6125#section-6.4.3</a> Upstream patch: <a href="https://hg.mozilla.org/projects/nss/rev/15ea62260c21">https://hg.mozilla.org/projects/nss/rev/15ea62260c21</a> <a href="https://hg.mozilla.org/projects/nss/rev/2ffa40a3ff55">https://hg.mozilla.org/projects/nss/rev/2ffa40a3ff55</a> <a href="https://hg.mozilla.org/projects/nss/rev/709d4e597979">https://hg.mozilla.org/projects/nss/rev/709d4e597979</a> Upstream bug (not public): <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=903885">https://bugzilla.mozilla.org/show_bug.cgi?id=903885</a> This issue was fixed upstream in NSS 3.16: <a href="https://developer.mozilla.org/en-US/docs/NSS/NSS_3.16_release_notes">https://developer.mozilla.org/en-US/docs/NSS/NSS_3.16_release_notes</a>
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nss | <3.16 | 3.16 |
Mozilla NSS ESR | <=3.15.5 | |
Mozilla NSS ESR | =3.2 | |
Mozilla NSS ESR | =3.2.1 | |
Mozilla NSS ESR | =3.3 | |
Mozilla NSS ESR | =3.3.1 | |
Mozilla NSS ESR | =3.3.2 | |
Mozilla NSS ESR | =3.4 | |
Mozilla NSS ESR | =3.4.1 | |
Mozilla NSS ESR | =3.4.2 | |
Mozilla NSS ESR | =3.5 | |
Mozilla NSS ESR | =3.6 | |
Mozilla NSS ESR | =3.6.1 | |
Mozilla NSS ESR | =3.7 | |
Mozilla NSS ESR | =3.7.1 | |
Mozilla NSS ESR | =3.7.2 | |
Mozilla NSS ESR | =3.7.3 | |
Mozilla NSS ESR | =3.7.5 | |
Mozilla NSS ESR | =3.7.7 | |
Mozilla NSS ESR | =3.8 | |
Mozilla NSS ESR | =3.9 | |
Mozilla NSS ESR | =3.11.2 | |
Mozilla NSS ESR | =3.11.3 | |
Mozilla NSS ESR | =3.11.4 | |
Mozilla NSS ESR | =3.11.5 | |
Mozilla NSS ESR | =3.12 | |
Mozilla NSS ESR | =3.12.1 | |
Mozilla NSS ESR | =3.12.2 | |
Mozilla NSS ESR | =3.12.3 | |
Mozilla NSS ESR | =3.12.3.1 | |
Mozilla NSS ESR | =3.12.3.2 | |
Mozilla NSS ESR | =3.12.4 | |
Mozilla NSS ESR | =3.12.5 | |
Mozilla NSS ESR | =3.12.6 | |
Mozilla NSS ESR | =3.12.7 | |
Mozilla NSS ESR | =3.12.8 | |
Mozilla NSS ESR | =3.12.9 | |
Mozilla NSS ESR | =3.12.10 | |
Mozilla NSS ESR | =3.12.11 | |
Mozilla NSS ESR | =3.14 | |
Mozilla NSS ESR | =3.14.1 | |
Mozilla NSS ESR | =3.14.2 | |
Mozilla NSS ESR | =3.14.3 | |
Mozilla NSS ESR | =3.14.4 | |
Mozilla NSS ESR | =3.14.5 | |
Mozilla NSS ESR | =3.15 | |
Mozilla NSS ESR | =3.15.1 | |
Mozilla NSS ESR | =3.15.2 | |
Mozilla NSS ESR | =3.15.3 | |
Mozilla NSS ESR | =3.15.3.1 | |
Mozilla NSS ESR | =3.15.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1492 has been rated as a moderate severity vulnerability due to improper validation of wildcard certificates.
To fix CVE-2014-1492, update the affected NSS package to version 3.16 or later.
Vulnerable software versions include NSS versions up to 3.15.5 and specific ranges of 3.2 to 3.9.
CVE-2014-1492 could allow attackers to exploit wildcard certificates inadequately validated, potentially compromising secure communications.
A temporary workaround is to avoid the use of wildcard certificates in internationalized domain names until the update is applied.