Уязвимость подмены SSL-серверов в Mozilla Firefox, Thunderbird и SeaMonkey из-за некорректного распознавания удаления доверия к EV X.509 сертификату
Описание
В Mozilla Firefox до версии 26.0, Firefox ESR 24.x до версии 24.2, Thunderbird до версии 24.2 и SeaMonkey до версии 2.23 существует уязвимость, при которой программы не распознают удаление пользователем доверия к расширенному EV X.509 сертификату. Это упрощает для злоумышленников выполнение атак типа "man-in-the-middle" и подмену SSL-серверов в благоприятных условиях, используя действующий сертификат, который пользователь считает недействительным.
Затронутые версии ПО
- Mozilla Firefox до 26.0
- Firefox ESR 24.x до 24.2
- Thunderbird до 24.2
- SeaMonkey до 2.23
Тип уязвимости
- Подмена (спуфинг)
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Vendor Advisory
- Third Party Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Third Party Advisory
- ExploitIssue TrackingVendor Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
Одно из
EPSS
5.9 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
Связанные уязвимости
Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it easier for man-in-the-middle attackers to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user.
Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it easier for man-in-the-middle attackers to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user.
Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird ...
Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it easier for man-in-the-middle attackers to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user.
EPSS
5.9 Medium
CVSS3
4.3 Medium
CVSS2