The Public Key Pinning (PKP) implementation in Mozilla Firefox before 33.0 does not properly consider the connection-coalescing behavior of SPDY and HTTP/2 in the case of a shared IP address, which allows man-in-the-middle attackers to bypass an intended pinning configuration and spoof a web site by providing a valid certificate from an arbitrary recognized Certification Authority.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html - | |
References | () http://secunia.com/advisories/62022 - | |
References | () http://secunia.com/advisories/62023 - | |
References | () http://www.mozilla.org/security/announce/2014/mfsa2014-80.html - Vendor Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - | |
References | () http://www.securityfocus.com/bid/70432 - | |
References | () http://www.securitytracker.com/id/1031028 - | |
References | () http://www.ubuntu.com/usn/USN-2372-1 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1049095 - | |
References | () https://security.gentoo.org/glsa/201504-01 - |
Information
Published : 2014-10-15 10:55
Updated : 2024-11-21 02:04
NVD link : CVE-2014-1582
Mitre link : CVE-2014-1582
CVE.ORG link : CVE-2014-1582
JSON object : View
Products Affected
mozilla
- firefox
CWE
CWE-310
Cryptographic Issues