Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-2741

Опубликовано: 06 июл. 2015
Источник: debian
EPSS Низкий

Описание

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
iceweaselfixed38.1.0esr-1package
iceweaselend-of-lifesqueezepackage
iceweaselnot-affectedjessiepackage
iceweaselnot-affectedwheezypackage
icedovefixed38.1.0-1package
icedoveend-of-lifesqueezepackage
icedovenot-affectedjessiepackage
icedovenot-affectedwheezypackage

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2015-67/

EPSS

Процентиль: 67%
0.00562
Низкий

Связанные уязвимости

ubuntu
около 10 лет назад

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.

redhat
около 10 лет назад

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.

nvd
около 10 лет назад

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.

github
около 3 лет назад

Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.

oracle-oval
около 10 лет назад

ELSA-2015-1455: thunderbird security update (IMPORTANT)

EPSS

Процентиль: 67%
0.00562
Низкий