4.3

CVE-2014-1491

Exploit

Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value.

Data is provided by the National Vulnerability Database (NVD)
MozillaFirefox Version < 27.0
MozillaFirefox ESR Version < 24.3
MozillaNetwork Security Services Version < 3.15.4
MozillaSeamonkey Version < 2.24
MozillaThunderbird Version < 24.3.0
OracleVm Server Version3.2 HwPlatformx86
FedoraprojectFedora Version19
FedoraprojectFedora Version20
OpensuseOpensuse Version11.4
OpensuseOpensuse Version12.3
OpensuseOpensuse Version13.1
SuseLinux Enterprise Desktop Version11 Updatesp3
SuseLinux Enterprise Server Version11 Updatesp3
SuseLinux Enterprise Server Version11 Updatesp3 SwPlatformvmware
DebianDebian Linux Version7.0
DebianDebian Linux Version8.0
CanonicalUbuntu Linux Version12.04 SwEditionesm
CanonicalUbuntu Linux Version12.10
CanonicalUbuntu Linux Version13.10
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.61% 0.687
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:P/I:N/A:N
CWE-326 Inadequate Encryption Strength

The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.

http://www.securitytracker.com/id/1029717
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1029720
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1029721
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/65332
Third Party Advisory
VDB Entry
https://bugzilla.mozilla.org/show_bug.cgi?id=934545
Patch
Vendor Advisory
Exploit
Issue Tracking