CVE-2011-0082
06.06.2011, 19:55
The X.509 certificate validation functionality in Mozilla Firefox 4.0.x through 4.0.1 does not properly implement single-session security exceptions, which might make it easier for user-assisted remote attackers to spoof an SSL server via an untrusted certificate that triggers potentially unwanted local caching of documents from that server.Enginsight
| Vendor | Product | Version |
|---|---|---|
| mozilla | firefox | 4.0 |
| mozilla | firefox | 4.0:beta1 |
| mozilla | firefox | 4.0:beta10 |
| mozilla | firefox | 4.0:beta11 |
| mozilla | firefox | 4.0:beta12 |
| mozilla | firefox | 4.0:beta2 |
| mozilla | firefox | 4.0:beta3 |
| mozilla | firefox | 4.0:beta4 |
| mozilla | firefox | 4.0:beta5 |
| mozilla | firefox | 4.0:beta6 |
| mozilla | firefox | 4.0:beta7 |
| mozilla | firefox | 4.0:beta8 |
| mozilla | firefox | 4.0:beta9 |
| mozilla | firefox | 4.0.1 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Common Weakness Enumeration
References