Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-45419

Опубликовано: 22 дек. 2022
Источник: debian
EPSS Низкий

Описание

If the user added a security exception for an invalid TLS certificate, opened an ongoing TLS connection with a server that used that certificate, and then deleted the exception, Firefox would have kept the connection alive, making it seem like the certificate was still trusted. This vulnerability affects Firefox < 107.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed107.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2022-47/#CVE-2022-45419

EPSS

Процентиль: 25%
0.00087
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 3 лет назад

If the user added a security exception for an invalid TLS certificate, opened an ongoing TLS connection with a server that used that certificate, and then deleted the exception, Firefox would have kept the connection alive, making it seem like the certificate was still trusted. This vulnerability affects Firefox < 107.

CVSS3: 6.5
nvd
около 3 лет назад

If the user added a security exception for an invalid TLS certificate, opened an ongoing TLS connection with a server that used that certificate, and then deleted the exception, Firefox would have kept the connection alive, making it seem like the certificate was still trusted. This vulnerability affects Firefox < 107.

msrc
5 месяцев назад

If the user added a security exception for an invalid TLS certificate, opened an ongoing TLS connection with a server that used that certificate, and then deleted the exception, Firefox would have kept the connection alive, making it seem like the certificate was still trusted. This vulnerability affects Firefox < 107.

CVSS3: 6.5
github
около 3 лет назад

If the user added a security exception for an invalid TLS certificate, opened an ongoing TLS connection with a server that used that certificate, and then deleted the exception, Firefox would have kept the connection alive, making it seem like the certificate was still trusted. This vulnerability affects Firefox < 107.

CVSS3: 6.5
fstec
больше 3 лет назад

Уязвимость реализации протокола TLS веб-браузера Firefox, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю оказать воздействие на целостность данных

EPSS

Процентиль: 25%
0.00087
Низкий