Upstream information

CVE-2008-2809 at MITRE


Mozilla 1.9 M8 and earlier, Mozilla Firefox 2 before, SeaMonkey 1.1.5 and other versions before 1.1.10, Netscape 9.0, and other Mozilla-based web browsers, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regard the certificate as also accepted for all domain names in subjectAltName:dNSName fields, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4
Vector AV:N/AC:H/Au:N/C:N/I:P/A:P
Access Vector Network
Access Complexity High
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entries: 342689 [RESOLVED / FIXED], 400757 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE 11.0
  • seamonkey-debuginfo >= 1.1.11-3.1
  • seamonkey-debugsource >= 1.1.11-3.1
openSUSE 11.0
  • seamonkey >= 1.1.11-3.1
  • seamonkey-dom-inspector >= 1.1.11-3.1
  • seamonkey-irc >= 1.1.11-3.1
  • seamonkey-mail >= 1.1.11-3.1
  • seamonkey-spellchecker >= 1.1.11-3.1
  • seamonkey-venkman >= 1.1.11-3.1