We received a report of bugs in the construction of the emails we send out
in order to confirm authorization by the domain name registrant prior to
issuing a server certificate.

Colloquially these are known as Domain-Control Validation Emails.

 

The security researcher, Matthew Bryant, followed a responsible disclosure
process and we were afforded the opportunity to resolve this bug before he
published his blog post at 

https://thehackerblog.com/keeping-positive-obtaining-arbitrary-wildcard-ssl-
certificates-from-comodo-via-dangling-markup-injection/index.html

 

We are pleased to report that no certificates were issued contrary to the
terms of our CPS.

 

We have informed our external WebTrust auditors of the report and of its
resolution.

 

We will be further engaging with external security consultants to ensure
that our systems remain secure so that we may continue to meet our policy
obligations.

 

Regards

Robin Alden

Comodo

 

This email has also been posted to [email protected]
<mailto:[email protected]> 

 

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to