MAAS History
Archives
« GarageBand 5.1 Update | Main | Poof of Concept Firmware Keyboard Hack Demostrated at Black Hat »
Monday
Aug032009

Firefox Version 3.5.2

This version of Firefox addresses compromise of SSL-protected communication and heap overflow in certificate regexp parsing. The heap overflow of certificate names in handlers of regular expressions could allow an attacker to run malisious code. Firefox version 3.5 uses industry standard wildcard syntax which is not vulnerable to this flaw.

Dan Kaminsky, who had published the DNS flaw has discovered a mismatch of domain names in SSL certificates. If someone wanted to they can request a certificate with invalid or null character. Many Certificate Authorities would issue the ticket with incomplete or invalid information. SSL clients used the invalidated certificate information before the null allowing the attacker to be trusted. In a nut shell an attacker could obtain a certificate for any web site they wished to attack. The attack could allow for the interception and alteration of the encrypted communication between the client and server. This type of attack could be used to compromise client updates including the integrity of Firefox updates as demonstrated by Moxie Marlinspike.

PrintView Printer Friendly Version

EmailEmail Article to Friend

References (2)

References allow you to track sources for this article, as well as articles that were written in response to this article.

Reader Comments

There are no comments for this journal entry. To create a new comment, use the form below.
Member Account Required
You must have a member account on this website in order to post comments. Log in to your account to enable posting.