Описание
The HTTP Alternative Services feature in Mozilla Firefox before 37.0.1 allows man-in-the-middle attackers to bypass an intended X.509 certificate-verification step for an SSL server by specifying that server in the uri-host field of an Alt-Svc HTTP/2 response header.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 38.0+build3-0ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [37.0.1+build1-0ubuntu0.14.04.1]] |
| lucid | ignored | end of life |
| precise | released | 37.0.1+build1-0ubuntu0.12.04.1 |
| trusty | released | 37.0.1+build1-0ubuntu0.14.04.1 |
| trusty/esm | DNE | trusty was released [37.0.1+build1-0ubuntu0.14.04.1] |
| upstream | released | 37.0.1 |
| utopic | released | 37.0.1+build1-0ubuntu0.14.10.1 |
| vivid | released | 37.0.2+build1-0ubuntu0.15.04.1 |
Показывать по
EPSS
4.3 Medium
CVSS2
Связанные уязвимости
The HTTP Alternative Services feature in Mozilla Firefox before 37.0.1 allows man-in-the-middle attackers to bypass an intended X.509 certificate-verification step for an SSL server by specifying that server in the uri-host field of an Alt-Svc HTTP/2 response header.
The HTTP Alternative Services feature in Mozilla Firefox before 37.0.1 allows man-in-the-middle attackers to bypass an intended X.509 certificate-verification step for an SSL server by specifying that server in the uri-host field of an Alt-Svc HTTP/2 response header.
The HTTP Alternative Services feature in Mozilla Firefox before 37.0.1 ...
The HTTP Alternative Services feature in Mozilla Firefox before 37.0.1 allows man-in-the-middle attackers to bypass an intended X.509 certificate-verification step for an SSL server by specifying that server in the uri-host field of an Alt-Svc HTTP/2 response header.
Уязвимость браузера Firefox, позволяющая удалённому злоумышленнику обойти проверку сертификата
EPSS
4.3 Medium
CVSS2