Описание
Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 rely on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 49.0+build4-0ubuntu2 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [49.0+build4-0ubuntu0.14.04.1]] |
precise | released | 49.0+build4-0ubuntu0.12.04.1 |
trusty | released | 49.0+build4-0ubuntu0.14.04.1 |
trusty/esm | DNE | trusty was released [49.0+build4-0ubuntu0.14.04.1] |
upstream | released | 49.0 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | released | 49.0+build4-0ubuntu0.16.04.1 |
yakkety | released | 49.0+build4-0ubuntu2 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | released | 1:45.7.0+build1-0ubuntu1 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [1:45.4.0+build1-0ubuntu0.14.04.1]] |
precise | released | 1:45.4.0+build1-0ubuntu0.12.04.1 |
trusty | released | 1:45.4.0+build1-0ubuntu0.14.04.1 |
trusty/esm | DNE | trusty was released [1:45.4.0+build1-0ubuntu0.14.04.1] |
upstream | released | 45.4.0 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | released | 1:45.4.0+build1-0ubuntu0.16.04.1 |
yakkety | released | 1:45.4.0+build1-0ubuntu0.16.10.1 |
Показывать по
4.3 Medium
CVSS2
7.4 High
CVSS3
Связанные уязвимости
Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 rely on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority.
Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 rely on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority.
Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunder ...
Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 rely on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority.
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю подделывать обновления надстроек
4.3 Medium
CVSS2
7.4 High
CVSS3