Lucene search

K
archlinuxArch LinuxASA-201504-4
HistoryApr 04, 2015 - 12:00 a.m.

firefox: certificate verification bypass

2015-04-0400:00:00
Arch Linux
lists.archlinux.org
23

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

50.5%

Security researcher Muneaki Nishimura discovered a flaw in the Mozilla’s
HTTP Alternative Services implementation. If an Alt-Svc header is
specified in the HTTP/2 response, SSL certificate verification can be
bypassed for the specified alternate server. As a result of this,
warnings of invalid SSL certificates will not be displayed and an
attacker could potentially impersonate another site through a
man-in-the-middle (MTIM), replacing the original certificate with their own.

OSVersionArchitecturePackageVersionFilename
anyanyanyfirefox< 37.0.1-1UNKNOWN

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

50.5%