Certificate verification bypass through the HTTP/2 Alt-Svc header

Related Vulnerabilities: CVE-2015-0799  

Mozilla Foundation Security Advisory 2015-44

Certificate verification bypass through the HTTP/2 Alt-Svc header

Announced
April 3, 2015
Reporter
Muneaki Nishimura
Impact
Critical
Products
Firefox, SeaMonkey
Fixed in
  • Firefox 37.0.1
  • SeaMonkey 2.35

Description

Security researcher Muneaki Nishimura discovered a flaw in the Mozilla's HTTP Alternative Services implementation. If an Alt-Svc header is specified in the HTTP/2 response, SSL certificate verification can be bypassed for the specified alternate server. As a result of this, warnings of invalid SSL certificates will not be displayed and an attacker could potentially impersonate another site through a man-in-the-middle (MTIM), replacing the original certificate with their own.

References