CVE-2009-2409

N/A Unknown
Published: July 30, 2009 Modified: April 23, 2026
View on NVD

Description

The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://java.sun.com/j2se/1.5.0/ReleaseNotes.html
Source: secalert@redhat.com
Patch
http://java.sun.com/javase/6/webnotes/6u17.html
Source: secalert@redhat.com
Release Notes
http://secunia.com/advisories/36139
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/36157
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/36434
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/36669
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/36739
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/37386
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/42467
Source: secalert@redhat.com
Not Applicable
http://security.gentoo.org/glsa/glsa-200911-02.xml
Source: secalert@redhat.com
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200912-01.xml
Source: secalert@redhat.com
Third Party Advisory
http://support.apple.com/kb/HT3937
Source: secalert@redhat.com
Broken Link
http://www.debian.org/security/2009/dsa-1874
Source: secalert@redhat.com
Mailing List
http://www.redhat.com/support/errata/RHSA-2009-1207.html
Source: secalert@redhat.com
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2009-1432.html
Source: secalert@redhat.com
Third Party Advisory
http://www.securitytracker.com/id?1022631
Source: secalert@redhat.com
Broken Link
http://www.ubuntu.com/usn/usn-810-1
Source: secalert@redhat.com
Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2010-0019.html
Source: secalert@redhat.com
Third Party Advisory
http://www.vupen.com/english/advisories/2009/2085
Source: secalert@redhat.com
Vendor Advisory
http://www.vupen.com/english/advisories/2009/3184
Source: secalert@redhat.com
Vendor Advisory
http://www.vupen.com/english/advisories/2010/3126
Source: secalert@redhat.com
Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2409
Source: secalert@redhat.com
Third Party Advisory
https://rhn.redhat.com/errata/RHSA-2010-0095.html
Source: secalert@redhat.com
Third Party Advisory
https://usn.ubuntu.com/810-2/
Source: secalert@redhat.com
Broken Link
https://www.debian.org/security/2009/dsa-1888
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://java.sun.com/j2se/1.5.0/ReleaseNotes.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://java.sun.com/javase/6/webnotes/6u17.html
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36139
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36157
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36434
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36669
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/36739
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/37386
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/42467
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://security.gentoo.org/glsa/glsa-200911-02.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200912-01.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.apple.com/kb/HT3937
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.debian.org/security/2009/dsa-1874
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.mandriva.com/security/advisories?name=MDVSA-2009:197
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://www.mandriva.com/security/advisories?name=MDVSA-2009:216
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://www.mandriva.com/security/advisories?name=MDVSA-2009:258
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://www.mandriva.com/security/advisories?name=MDVSA-2010:084
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://www.redhat.com/support/errata/RHSA-2009-1207.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2009-1432.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/archive/1/515055/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securitytracker.com/id?1022631
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.ubuntu.com/usn/usn-810-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2010-0019.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.vupen.com/english/advisories/2009/2085
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2009/3184
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2010/3126
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2409
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://rhn.redhat.com/errata/RHSA-2010-0095.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/810-2/
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://www.debian.org/security/2009/dsa-1888
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory

74 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
2.2%
85th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

openssl gnu mozilla