The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) before 3.16 accepts a wildcard character that is embedded in an internationalized domain name's U-label, which might allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
{
"binaries": [
{
"binary_name": "firefox",
"binary_version": "29.0+build1-0ubuntu0.14.04.2"
},
{
"binary_name": "firefox-dev",
"binary_version": "29.0+build1-0ubuntu0.14.04.2"
},
{
"binary_name": "firefox-globalmenu",
"binary_version": "29.0+build1-0ubuntu0.14.04.2"
},
{
"binary_name": "firefox-mozsymbols",
"binary_version": "29.0+build1-0ubuntu0.14.04.2"
},
{
"binary_name": "firefox-testsuite",
"binary_version": "29.0+build1-0ubuntu0.14.04.2"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "libnss3",
"binary_version": "2:3.15.4-1ubuntu7"
},
{
"binary_name": "libnss3-1d",
"binary_version": "2:3.15.4-1ubuntu7"
},
{
"binary_name": "libnss3-dev",
"binary_version": "2:3.15.4-1ubuntu7"
},
{
"binary_name": "libnss3-nssdb",
"binary_version": "2:3.15.4-1ubuntu7"
},
{
"binary_name": "libnss3-tools",
"binary_version": "2:3.15.4-1ubuntu7"
}
],
"availability": "No subscription required"
}