Описание
The crypto.generateCRMFRequest method in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not properly validate a certain key type, which allows remote attackers to cause a denial of service (application crash) via vectors that trigger generation of a key that supports the Elliptic Curve ec-dual-use algorithm.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 28.0+build2-0ubuntu1 |
| lucid | ignored | end of life |
| precise | released | 28.0+build2-0ubuntu0.12.04.1 |
| quantal | released | 28.0+build2-0ubuntu0.12.10.1 |
| saucy | released | 28.0+build2-0ubuntu0.13.10.1 |
| upstream | released | 28.0 |
Показывать по
EPSS
5 Medium
CVSS2
Связанные уязвимости
The crypto.generateCRMFRequest method in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not properly validate a certain key type, which allows remote attackers to cause a denial of service (application crash) via vectors that trigger generation of a key that supports the Elliptic Curve ec-dual-use algorithm.
The crypto.generateCRMFRequest method in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not properly validate a certain key type, which allows remote attackers to cause a denial of service (application crash) via vectors that trigger generation of a key that supports the Elliptic Curve ec-dual-use algorithm.
The crypto.generateCRMFRequest method in Mozilla Firefox before 28.0 a ...
The crypto.generateCRMFRequest method in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not properly validate a certain key type, which allows remote attackers to cause a denial of service (application crash) via vectors that trigger generation of a key that supports the Elliptic Curve ec-dual-use algorithm.
Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику вызвать отказ в обслуживании
EPSS
5 Medium
CVSS2