SSL Certificate Null Byte Poisoning (July 31, 2009)
Multiple browsers are theoretically prone to a security-bypass vulnerability. The problem is due to improper validation of the domain name in a signed Certificate Authority (CA) certificate. Successfully exploiting this issue allows attackers to perform man-in-the-middle attacks.
Dan Kaminsky and Moxie Marlinspike, while working separately, have discovered the same vulnerability that would affect many SSL implementations. Basically when the vulnerable browsers check the domain name contained in the attacker’s certificate, they stop reading any characters that follow a null byte (x00 or ) character. The vulnerability has been assigned as CVE-2009-2408. The whole trick is to get a CA to sign a certificate for a subdomain containing a null byte. An example would be paypal.com .malicious.com, where “paypal.com ” is the subdomain and “