The Public Key Pinning (PKP) implementation in Mozilla Firefox before 33.0 skips pinning checks upon an unspecified issuer-verification error, which makes it easier for remote attackers to bypass an intended pinning configuration and spoof a web site via a crafted certificate that leads to presentation of the Untrusted Connection dialog to the user.
Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141085.html | vendor advisory |
http://www.mozilla.org/security/announce/2014/mfsa2014-80.html | vendor advisory |
http://www.securitytracker.com/id/1031028 | vdb entry |
http://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html | vendor advisory |
http://www.securityfocus.com/bid/70434 | vdb entry |
https://security.gentoo.org/glsa/201504-01 | vendor advisory |
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | |
https://bugzilla.mozilla.org/show_bug.cgi?id=1066190 | |
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/141796.html | vendor advisory |
http://www.ubuntu.com/usn/USN-2372-1 | vendor advisory |
http://secunia.com/advisories/62022 | third party advisory |
http://secunia.com/advisories/62023 | third party advisory |