Your submission was sent successfully! Close

CVE-2014-8642

Published: 14 January 2015

Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not consider the id-pkix-ocsp-nocheck extension in deciding whether to trust an OCSP responder, which makes it easier for remote attackers to obtain sensitive information by sniffing the network during a session in which there was an incorrect decision to accept a compromised and revoked certificate.

Priority

Low

Status

Package Release Status
firefox
Launchpad, Ubuntu, Debian
lucid Ignored
(reached end of life)
precise
Released (35.0+build3-0ubuntu0.12.04.2)
trusty Does not exist
(trusty was released [35.0+build3-0ubuntu0.14.04.2])
upstream
Released (35.0)
utopic
Released (35.0+build3-0ubuntu0.14.10.2)