Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2009-2061

Publication date 15 June 2009

Last updated 24 July 2024


Ubuntu priority

Mozilla Firefox before 3.0.10 processes a 3xx HTTP CONNECT response before a successful SSL handshake, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying this CONNECT response to specify a 302 redirect to an arbitrary https web site.

Read the notes from the security team

Status

Package Ubuntu Release Status
firefox 11.04 natty
Not affected
10.10 maverick
Not affected
10.04 LTS lucid
Not affected
9.10 karmic Not in release
9.04 jaunty Not in release
8.10 intrepid Not in release
8.04 LTS hardy Ignored
6.06 LTS dapper Ignored
kde4libs 11.04 natty
Not affected
10.10 maverick
Not affected
10.04 LTS lucid
Not affected
9.10 karmic
Not affected
9.04 jaunty
Not affected
8.10 intrepid Ignored
8.04 LTS hardy Ignored
6.06 LTS dapper Not in release
kdelibs 11.04 natty
Not affected
10.10 maverick
Not affected
10.04 LTS lucid
Not affected
9.10 karmic
Not affected
9.04 jaunty
Not affected
8.10 intrepid Ignored
8.04 LTS hardy Ignored
6.06 LTS dapper Ignored
qt4-x11 11.04 natty
Not affected
10.10 maverick
Not affected
10.04 LTS lucid
Not affected
9.10 karmic
Not affected
9.04 jaunty
Not affected
8.10 intrepid Ignored
8.04 LTS hardy
Not affected
6.06 LTS dapper
Not affected
seamonkey 11.04 natty
Fixed 1.1.17+nobinonly-0ubuntu1
10.10 maverick
Fixed 1.1.17+nobinonly-0ubuntu1
10.04 LTS lucid
Fixed 1.1.17+nobinonly-0ubuntu1
9.10 karmic
Fixed 1.1.17+nobinonly-0ubuntu1
9.04 jaunty
Fixed 1.1.17+nobinonly-0ubuntu0.9.04.1
8.10 intrepid
Fixed 1.1.17+nobinonly-0ubuntu0.8.10.1
8.04 LTS hardy
Fixed 1.1.17+nobinonly-0ubuntu0.8.04.1
6.06 LTS dapper Not in release
webkit 11.04 natty
Not affected
10.10 maverick
Not affected
10.04 LTS lucid
Not affected
9.10 karmic
Not affected
9.04 jaunty
Not affected
8.10 intrepid Ignored
8.04 LTS hardy Ignored
6.06 LTS dapper Not in release
xulrunner-1.9 11.04 natty Not in release
10.10 maverick Not in release
10.04 LTS lucid Not in release
9.10 karmic Not in release
9.04 jaunty
Fixed 1.9.0.11+build2+nobinonly-0ubuntu0.9.04.1
8.10 intrepid
Fixed 1.9.0.11+build2+nobinonly-0ubuntu0.8.10.2
8.04 LTS hardy
Fixed 1.9.0.11+build2+nobinonly-0ubuntu0.8.04.1
6.06 LTS dapper Not in release
xulrunner-1.9.1 11.04 natty Not in release
10.10 maverick Not in release
10.04 LTS lucid Not in release
9.10 karmic
Fixed 1.9.1~rc2+nobinonly-0ubuntu1
9.04 jaunty
Fixed 1.9.1+nobinonly-0ubuntu0.9.04.1
8.10 intrepid Not in release
8.04 LTS hardy Not in release
6.06 LTS dapper Not in release

Notes


jdstrand

https://www.paypal.com/ is the PoC site, but https://wiki.sne.bianheman.eu.org seems to be a valid trigger as well (both set a cookie which is sent on connect). https://www.verisign.com will trigger the alert() in the PoC, but doesn't contain the cookie firefox-3.0 (3.0.9) is confirmed to be affected mozilla is silently fixing this in 3.0.10, but it won't be public until the CRD konqueror 3 (kdelibs) in dapper is confirmed to be affected konqueror 4 (kde4libs) in jaunty does not seem to be affected (displays it's own connection refused message for all 4xx codes) webkit on jaunty does not seem affected, though all of its consumers are rather flaky (midori, python-webkit/webbrowser.py, webkit/GtkLauncher, kazehakase-webkit). None of these would work with paypal or wiki.u.c, but would with https://www.verisign.com/. At verisign, firefox would display the PoC alert, but without the cookie. webkit, midori and python-webkit would not display the alert at all (kazehakase crashes on any page load). Other consumers are devhelp and anjuta, but I didn't see how to get an external page to load. At any rate, webkit is a tentative 'not-affected'. Will get more feedback from Debian maintainer. qt4-x11 in jaunty does not seem to be affected. arora is its browser consumer and it displays its own 'HTTP request failed' message for all 4xx codes also checked epiphany-webkit on 8.10. The browser can go to paypal, but is not vulnerable (does not display the alert at all for all 4xx codes)