{"vuid":"VU#784278","idnumber":"784278","name":"Mozilla fails to validate the DN of X.509 certificates","keywords":["Mozilla","SSL","CA"],"overview":"Mozilla fails to verify that the Distinguished Name (DN) of an X.509 certificate is unique when importing it. A denial of service occurs when Mozilla imports a specially crafted, self-signed certificate that has the same DN as an existing Certificate Authority (CA) root certificate.","clean_desc":"Mozilla version 1.7.1 and earlier can import a self-signed certificate with the same DN as an existing CA root certificate. When this occurs, the imported certificate will override the CA root certificate. Mozilla will return an error when attempting to create a secure connection to a website whose certificate is signed by a CA root certificate that has been overridden in this manner. A remote attacker can automate exploitation of this vulnerability using the \"application/x-x509-email-cert\" MIME type. This will permit Mozilla to import the certificate without any user intervention.","impact":"A remote attacker could cause a denial of service against the certificate store, preventing the user from accessing SSL websites.","resolution":"This issue has been resolved in the following versions: Mozilla 1.7.2\n  Firefox 0.9.3\n  Thunderbird 0.7.3 For other Mozilla-based products, please check with your vendor for updates.","workarounds":"","sysaffected":"","thanks":"This was reported on the Mozilla Known Vulnerabilities List. Mozilla attributes this report to Marcel Boesch.","author":"This document was written by Will Dormann.","public":["http://www.mozilla.org/projects/security/known-vulnerabilities.html","http://bugzilla.mozilla.org/show_bug.cgi?id=249004","http://xforce.iss.net/xforce/xfdb/16706","http://secunia.com/advisories/12076/"],"cveids":["CVE-2004-0758"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-08-06T18:22:03Z","publicdate":"2004-06-29T00:00:00Z","datefirstpublished":"2004-08-23T17:17:35Z","dateupdated":"2004-08-25T14:10:05Z","revision":12,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"10","cam_impact":"3","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"5.175","cam_scorecurrentwidelyknown":"5.175","cam_scorecurrentwidelyknownexploited":"9.675","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":5.175,"vulnote":null}