Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
https://bugzilla.redhat.com/show_bug.cgi?id=510251
http://www.wired.com/threatlevel/2009/07/kaminsky/
http://www.ubuntu.com/usn/usn-810-1
http://www.mozilla.org/security/announce/2009/mfsa2009-42.html
http://www.debian.org/security/2009/dsa-1874
http://marc.info/?l=oss-security&m=125198917018936&w=2
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html