The X.509 certificate validation functionality in Mozilla Firefox 4.0.x through 4.0.1 does not properly implement single-session security exceptions, which might make it easier for user-assisted remote attackers to spoof an SSL server via an untrusted certificate that triggers potentially unwanted local caching of documents from that server.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=627552 - Exploit | |
References | () http://openwall.com/lists/oss-security/2011/05/31/14 - Exploit | |
References | () http://openwall.com/lists/oss-security/2011/05/31/18 - Exploit | |
References | () http://openwall.com/lists/oss-security/2011/05/31/4 - Exploit | |
References | () http://openwall.com/lists/oss-security/2011/05/31/9 - Exploit | |
References | () http://www.securityfocus.com/bid/48064 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=660749 - Exploit | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=709165 - Exploit | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14145 - |
Information
Published : 2011-06-06 19:55
Updated : 2024-11-21 01:23
NVD link : CVE-2011-0082
Mitre link : CVE-2011-0082
CVE.ORG link : CVE-2011-0082
JSON object : View
Products Affected
mozilla
- firefox
CWE
CWE-20
Improper Input Validation