Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-1498

Опубликовано: 18 мар. 2014
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

The crypto.generateCRMFRequest method in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not properly validate a certain key type, which allows remote attackers to cause a denial of service (application crash) via vectors that trigger generation of a key that supports the Elliptic Curve ec-dual-use algorithm.

Отчет

This issue does not affect the version of firefox and thunderbird as shipped with Red Hat Enterprise Linux 5 and 6

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5firefoxNot affected
Red Hat Enterprise Linux 5thunderbirdNot affected
Red Hat Enterprise Linux 6firefoxNot affected
Red Hat Enterprise Linux 6thunderbirdNot affected

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=1077018Mozilla: crypto.generateCRMFRequest does not validate type of key (MFSA 2014-18)

EPSS

Процентиль: 67%
0.00548
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 12 лет назад

The crypto.generateCRMFRequest method in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not properly validate a certain key type, which allows remote attackers to cause a denial of service (application crash) via vectors that trigger generation of a key that supports the Elliptic Curve ec-dual-use algorithm.

nvd
почти 12 лет назад

The crypto.generateCRMFRequest method in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not properly validate a certain key type, which allows remote attackers to cause a denial of service (application crash) via vectors that trigger generation of a key that supports the Elliptic Curve ec-dual-use algorithm.

debian
почти 12 лет назад

The crypto.generateCRMFRequest method in Mozilla Firefox before 28.0 a ...

github
больше 3 лет назад

The crypto.generateCRMFRequest method in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not properly validate a certain key type, which allows remote attackers to cause a denial of service (application crash) via vectors that trigger generation of a key that supports the Elliptic Curve ec-dual-use algorithm.

fstec
почти 12 лет назад

Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику вызвать отказ в обслуживании

EPSS

Процентиль: 67%
0.00548
Низкий

4.3 Medium

CVSS2