Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.
Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2015-1455.html | vendor advisory |
http://www.mozilla.org/security/announce/2015/mfsa2015-67.html | vendor advisory |
https://security.gentoo.org/glsa/201512-10 | vendor advisory |
http://www.securityfocus.com/bid/75541 | vdb entry |
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | third party advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1147497 | issue tracking vendor advisory |
http://www.securitytracker.com/id/1032784 | vdb entry |
http://rhn.redhat.com/errata/RHSA-2015-1207.html | vendor advisory |
http://www.ubuntu.com/usn/USN-2656-1 | vendor advisory |
http://www.securitytracker.com/id/1032783 | vdb entry |
http://www.ubuntu.com/usn/USN-2656-2 | vendor advisory |
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html | third party advisory |