The Public Key Pinning (PKP) implementation in Mozilla Firefox before 33.0 does not properly consider the connection-coalescing behavior of SPDY and HTTP/2 in the case of a shared IP address, which allows man-in-the-middle attackers to bypass an intended pinning configuration and spoof a web site by providing a valid certificate from an arbitrary recognized Certification Authority.
Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Link | Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1049095 | |
http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html | vendor advisory |
http://www.mozilla.org/security/announce/2014/mfsa2014-80.html | vendor advisory |
http://www.securitytracker.com/id/1031028 | vdb entry |
http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html | vendor advisory |
https://security.gentoo.org/glsa/201504-01 | vendor advisory |
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | |
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html | vendor advisory |
http://www.ubuntu.com/usn/USN-2372-1 | vendor advisory |
http://secunia.com/advisories/62022 | third party advisory |
http://secunia.com/advisories/62023 | third party advisory |
http://www.securityfocus.com/bid/70432 | vdb entry |