Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.2.1.2015.13
Category:General
Title:Mozilla Firefox Security Advisory (MFSA2015-13) - Linux
Summary:This host is missing a security update for Mozilla Firefox.
Description:Summary:
This host is missing a security update for Mozilla Firefox.

Vulnerability Insight:
Appended period to hostnames can bypass HPKP and HSTS protections
Security researcher Muneaki Nishimura reported that when
certificate pinning is set to 'strict' mode, a period ('.') appended to a
hostname in the address of a site allowed the bypass key pinning (HPKP) and HTTP
Strict Transport Security (HSTS). Sites with a period appended were treated as
having a different origin than sites without the period. If an attacker had a
security certificate for a domain with the added period, this would allow for a
Man-in-the-middle (MITM) attack on users.

Affected Software/OS:
Firefox version(s) below 36.

Solution:
The vendor has released an update. Please see the reference(s) for more information.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-0832
BugTraq ID: 72752
http://www.securityfocus.com/bid/72752
https://security.gentoo.org/glsa/201504-01
SuSE Security Announcement: openSUSE-SU-2015:0404 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html
SuSE Security Announcement: openSUSE-SU-2015:0570 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html
http://www.ubuntu.com/usn/USN-2505-1
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.