[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2011-0082

Date: (C)2011-06-06   (M)2017-09-22
 
CVSS Score: 4.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 2.9Authentication: NONE
 Confidentiality: NONE
 Integrity: PARTIAL
 Availability: NONE











The X.509 certificate validation functionality in Mozilla Firefox 4.0.x through 4.0.1 does not properly implement single-session security exceptions, which might make it easier for user-assisted remote attackers to spoof an SSL server via an untrusted certificate that triggers potentially unwanted local caching of documents from that server.

Reference:
BID-48064
http://openwall.com/lists/oss-security/2011/05/31/4
http://openwall.com/lists/oss-security/2011/05/31/9
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=627552
https://bugzilla.mozilla.org/show_bug.cgi?id=660749
https://bugzilla.redhat.com/show_bug.cgi?id=709165

CPE    14
cpe:/a:mozilla:firefox:4.0.1
cpe:/a:mozilla:firefox:4.0:beta8
cpe:/a:mozilla:firefox:4.0:beta7
cpe:/a:mozilla:firefox:4.0:beta6
...
CWE    1
CWE-20
OVAL    2
oval:org.secpod.oval:def:1510
oval:org.secpod.oval:def:1509

© 2013 SecPod Technologies