Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-23-1 | nss security update |
![]() |
DSA-2858-1 | iceweasel security update |
![]() |
DSA-2994-1 | nss security update |
![]() |
EUVD-2014-1567 | Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value. |
![]() |
USN-2102-1 | Firefox vulnerabilities |
![]() |
USN-2119-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-08-06T09:42:36.031Z
Reserved: 2014-01-16T00:00:00
Link: CVE-2014-1491

No data.

Status : Deferred
Published: 2014-02-06T05:44:25.127
Modified: 2025-04-11T00:51:21.963
Link: CVE-2014-1491


No data.