Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-2395

Опубликовано: 27 июл. 2005
Источник: debian
EPSS Низкий

Описание

Mozilla Firefox 1.0.4 and 1.0.5 does not choose the challenge with the strongest authentication scheme available as required by RFC2617, which might cause credentials to be sent in plaintext even if an encrypted channel is available.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxremovedpackage
iceweaselremovedpackage
mozilla-firefoxfixed1.4.99+1.5rc3.dfsg-2package
mozillaremovedpackage

Примечания

  • Firefox and Mozilla follow RFC behaviour. This is more a lack of security

  • feature (client-side preference for stronger methods) and not a vulnerabilit

  • This also seems like a rare setup.

EPSS

Процентиль: 73%
0.00794
Низкий

Связанные уязвимости

ubuntu
около 20 лет назад

Mozilla Firefox 1.0.4 and 1.0.5 does not choose the challenge with the strongest authentication scheme available as required by RFC2617, which might cause credentials to be sent in plaintext even if an encrypted channel is available.

redhat
больше 21 года назад

Mozilla Firefox 1.0.4 and 1.0.5 does not choose the challenge with the strongest authentication scheme available as required by RFC2617, which might cause credentials to be sent in plaintext even if an encrypted channel is available.

nvd
около 20 лет назад

Mozilla Firefox 1.0.4 and 1.0.5 does not choose the challenge with the strongest authentication scheme available as required by RFC2617, which might cause credentials to be sent in plaintext even if an encrypted channel is available.

github
больше 3 лет назад

Mozilla Firefox 1.0.4 and 1.0.5 does not choose the challenge with the strongest authentication scheme available as required by RFC2617, which might cause credentials to be sent in plaintext even if an encrypted channel is available.

EPSS

Процентиль: 73%
0.00794
Низкий