Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-1582

Опубликовано: 15 окт. 2014
Источник: ubuntu
Приоритет: low
CVSS2: 4.3

Описание

The Public Key Pinning (PKP) implementation in Mozilla Firefox before 33.0 does not properly consider the connection-coalescing behavior of SPDY and HTTP/2 in the case of a shared IP address, which allows man-in-the-middle attackers to bypass an intended pinning configuration and spoof a web site by providing a valid certificate from an arbitrary recognized Certification Authority.

РелизСтатусПримечание
devel

released

33.0+build2-0ubuntu0.14.10.1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [33.0+build2-0ubuntu0.14.04.1]]
lucid

ignored

end of life
precise

released

33.0+build2-0ubuntu0.12.04.1
trusty

released

33.0+build2-0ubuntu0.14.04.1
trusty/esm

DNE

trusty was released [33.0+build2-0ubuntu0.14.04.1]
upstream

released

33.0

Показывать по

4.3 Medium

CVSS2

Связанные уязвимости

redhat
больше 11 лет назад

The Public Key Pinning (PKP) implementation in Mozilla Firefox before 33.0 does not properly consider the connection-coalescing behavior of SPDY and HTTP/2 in the case of a shared IP address, which allows man-in-the-middle attackers to bypass an intended pinning configuration and spoof a web site by providing a valid certificate from an arbitrary recognized Certification Authority.

nvd
больше 11 лет назад

The Public Key Pinning (PKP) implementation in Mozilla Firefox before 33.0 does not properly consider the connection-coalescing behavior of SPDY and HTTP/2 in the case of a shared IP address, which allows man-in-the-middle attackers to bypass an intended pinning configuration and spoof a web site by providing a valid certificate from an arbitrary recognized Certification Authority.

debian
больше 11 лет назад

The Public Key Pinning (PKP) implementation in Mozilla Firefox before ...

github
больше 3 лет назад

The Public Key Pinning (PKP) implementation in Mozilla Firefox before 33.0 does not properly consider the connection-coalescing behavior of SPDY and HTTP/2 in the case of a shared IP address, which allows man-in-the-middle attackers to bypass an intended pinning configuration and spoof a web site by providing a valid certificate from an arbitrary recognized Certification Authority.

4.3 Medium

CVSS2