CVE-2013-6673
11.12.2013, 15:55
Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it easier for man-in-the-middle attackers to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user.Enginsight
Vendor | Product | Version |
---|---|---|
mozilla | firefox | 𝑥 < 26.0 |
mozilla | firefox_esr | 24.0 ≤ 𝑥 < 24.2 |
mozilla | seamonkey | 𝑥 < 2.23 |
mozilla | thunderbird | 𝑥 < 24.2 |
suse | suse_linux_enterprise_software_development_kit | 11.0:sp3 |
opensuse | opensuse | 12.2 |
opensuse | opensuse | 12.3 |
opensuse | opensuse | 13.1 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 12.10 |
canonical | ubuntu_linux | 13.04 |
canonical | ubuntu_linux | 13.10 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
firefox |
| ||||||||||
thunderbird |
|
Common Weakness Enumeration
References