CVE-2014-8642
14.01.2015, 11:59
Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not consider the id-pkix-ocsp-nocheck extension in deciding whether to trust an OCSP responder, which makes it easier for remote attackers to obtain sensitive information by sniffing the network during a session in which there was an incorrect decision to accept a compromised and revoked certificate.Enginsight
Vendor | Product | Version |
---|---|---|
mozilla | seamonkey | 𝑥 ≤ 2.31 |
opensuse | opensuse | 13.1 |
opensuse | opensuse | 13.2 |
mozilla | firefox | 𝑥 ≤ 34.0.5 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References