Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-23-1 | nss security update |
Debian DSA |
DSA-2858-1 | iceweasel security update |
Debian DSA |
DSA-2994-1 | nss security update |
EUVD |
EUVD-2014-1567 | Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value. |
Ubuntu USN |
USN-2102-1 | Firefox vulnerabilities |
Ubuntu USN |
USN-2119-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-08-06T09:42:36.031Z
Reserved: 2014-01-16T00:00:00
Link: CVE-2014-1491
No data.
Status : Deferred
Published: 2014-02-06T05:44:25.127
Modified: 2025-04-11T00:51:21.963
Link: CVE-2014-1491
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN