CVE-2014-8642

Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not consider the id-pkix-ocsp-nocheck extension in deciding whether to trust an OCSP responder, which makes it easier for remote attackers to obtain sensitive information by sniffing the network during a session in which there was an incorrect decision to accept a compromised and revoked certificate.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2015-01-14 11:59

Updated : 2024-02-04 18:35


NVD link : CVE-2014-8642

Mitre link : CVE-2014-8642

CVE.ORG link : CVE-2014-8642


JSON object : View

Products Affected

mozilla

  • seamonkey
  • firefox

opensuse

  • opensuse
CWE
CWE-310

Cryptographic Issues