Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2014-8642

Overview

Vulnerability Score 4.3 4.3
CVE Id CVE-2014-8642
Last Modified 27 Feb 2015 03:12:57
Published 14 Jan 2015 06:59:10
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact NONE NONE
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2014-8642

Summary

Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not consider the id-pkix-ocsp-nocheck extension in deciding whether to trust an OCSP responder, which makes it easier for remote attackers to obtain sensitive information by sniffing the network during a session in which there was an incorrect decision to accept a compromised and revoked certificate.

Vulnerable Systems

Operating System

  • Novell Opensuse 13.1

  • Novell Opensuse 13.2

Application

  • Mozilla Firefox 34.0.5

  • Mozilla Seamonkey 2.31


References

CONFIRM - https://bugzilla.mozilla.org/show_bug.cgi?id=1079658

CONFIRM - http://www.mozilla.org/security/announce/2014/mfsa2015-08.html

SECTRACK - 1031533

SECUNIA - 62250

SECUNIA - 62242

SECUNIA - 62790

SECUNIA - 62446

SUSE - openSUSE-SU-2015:0192

SUSE - openSUSE-SU-2015:0077

Related Patches

Mozilla Firefox 35.0 for Mac OS X (See Notes)


Last Updated: 27 May 2016 11:07:57