4.3
CVE-2014-1491
- EPSS 0.61%
- Published 06.02.2014 05:44:25
- Last modified 11.04.2025 00:51:21
- Source security@mozilla.org
- Teams watchlist Login
- Open Login
Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value.
Data is provided by the National Vulnerability Database (NVD)
Mozilla ≫ Firefox ESR Version < 24.3
Mozilla ≫ Network Security Services Version < 3.15.4
Mozilla ≫ Thunderbird Version < 24.3.0
Oracle ≫ Enterprise Manager Ops Center Version < 12.1.4
Oracle ≫ Enterprise Manager Ops Center Version12.2.0
Oracle ≫ Enterprise Manager Ops Center Version12.2.1
Oracle ≫ Enterprise Manager Ops Center Version12.3.0
Fedoraproject ≫ Fedora Version19
Fedoraproject ≫ Fedora Version20
Suse ≫ Linux Enterprise Desktop Version11 Updatesp3
Suse ≫ Linux Enterprise Server Version11 Updatesp3
Suse ≫ Linux Enterprise Server Version11 Updatesp3 SwPlatformvmware
Suse ≫ Linux Enterprise Software Development Kit Version11 Updatesp3
Debian ≫ Debian Linux Version7.0
Debian ≫ Debian Linux Version8.0
Canonical ≫ Ubuntu Linux Version12.04 SwEditionesm
Canonical ≫ Ubuntu Linux Version12.10
Canonical ≫ Ubuntu Linux Version13.10
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.61% | 0.687 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:P/I:N/A:N
|
CWE-326 Inadequate Encryption Strength
The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.