CVE-2014-8642
14.01.2015, 11:59
Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not consider the id-pkix-ocsp-nocheck extension in deciding whether to trust an OCSP responder, which makes it easier for remote attackers to obtain sensitive information by sniffing the network during a session in which there was an incorrect decision to accept a compromised and revoked certificate.Enginsight
| Vendor | Product | Version |
|---|---|---|
| mozilla | seamonkey | 𝑥 ≤ 2.31 |
| opensuse | opensuse | 13.1 |
| opensuse | opensuse | 13.2 |
| mozilla | firefox | 𝑥 ≤ 34.0.5 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Common Weakness Enumeration
References