The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) before 3.16 accepts a wildcard character that is embedded in an internationalized domain name's U-label, which might allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
{ "binaries": [ { "binary_version": "29.0+build1-0ubuntu0.14.04.2", "binary_name": "firefox" }, { "binary_version": "29.0+build1-0ubuntu0.14.04.2", "binary_name": "firefox-dev" }, { "binary_version": "29.0+build1-0ubuntu0.14.04.2", "binary_name": "firefox-globalmenu" }, { "binary_version": "29.0+build1-0ubuntu0.14.04.2", "binary_name": "firefox-mozsymbols" }, { "binary_version": "29.0+build1-0ubuntu0.14.04.2", "binary_name": "firefox-testsuite" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "2:3.15.4-1ubuntu7", "binary_name": "libnss3" }, { "binary_version": "2:3.15.4-1ubuntu7", "binary_name": "libnss3-1d" }, { "binary_version": "2:3.15.4-1ubuntu7", "binary_name": "libnss3-dev" }, { "binary_version": "2:3.15.4-1ubuntu7", "binary_name": "libnss3-nssdb" }, { "binary_version": "2:3.15.4-1ubuntu7", "binary_name": "libnss3-tools" } ], "availability": "No subscription required" }