Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-2395

Опубликовано: 27 июл. 2005
Источник: debian

Описание

Mozilla Firefox 1.0.4 and 1.0.5 does not choose the challenge with the strongest authentication scheme available as required by RFC2617, which might cause credentials to be sent in plaintext even if an encrypted channel is available.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxremovedpackage
iceweaselremovedpackage
mozilla-firefoxfixed1.4.99+1.5rc3.dfsg-2package
mozillaremovedpackage

Примечания

  • Firefox and Mozilla follow RFC behaviour. This is more a lack of security

  • feature (client-side preference for stronger methods) and not a vulnerabilit

  • This also seems like a rare setup.

Связанные уязвимости

ubuntu
почти 20 лет назад

Mozilla Firefox 1.0.4 and 1.0.5 does not choose the challenge with the strongest authentication scheme available as required by RFC2617, which might cause credentials to be sent in plaintext even if an encrypted channel is available.

redhat
больше 21 года назад

Mozilla Firefox 1.0.4 and 1.0.5 does not choose the challenge with the strongest authentication scheme available as required by RFC2617, which might cause credentials to be sent in plaintext even if an encrypted channel is available.

nvd
почти 20 лет назад

Mozilla Firefox 1.0.4 and 1.0.5 does not choose the challenge with the strongest authentication scheme available as required by RFC2617, which might cause credentials to be sent in plaintext even if an encrypted channel is available.

github
около 3 лет назад

Mozilla Firefox 1.0.4 and 1.0.5 does not choose the challenge with the strongest authentication scheme available as required by RFC2617, which might cause credentials to be sent in plaintext even if an encrypted channel is available.