4.3
CVSSv2

CVE-2013-6673

Published: 11/12/2013 Updated: 12/08/2020
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Mozilla Firefox prior to 26.0, Firefox ESR 24.x prior to 24.2, Thunderbird prior to 24.2, and SeaMonkey prior to 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it easier for man-in-the-middle malicious users to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fedoraproject fedora 18

fedoraproject fedora 19

fedoraproject fedora 20

mozilla firefox

mozilla firefox esr

mozilla seamonkey

mozilla thunderbird

suse suse linux enterprise software development kit 11.0

opensuse opensuse 12.2

opensuse opensuse 12.3

opensuse opensuse 13.1

suse linux enterprise desktop 11

suse linux enterprise server 11

canonical ubuntu linux 12.04

canonical ubuntu linux 13.04

canonical ubuntu linux 13.10

canonical ubuntu linux 12.10

Vendor Advisories

Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Several security issues were fixed in Thunderbird ...
Mozilla Foundation Security Advisory 2013-113 Trust settings for built-in roots ignored during EV certificate validation Announced December 10, 2013 Reporter Sijie Xia Impact Moderate Products Firefox, Firefox ESR, SeaMonkey, ...
Mozilla Firefox before 260, Firefox ESR 24x before 242, Thunderbird before 242, and SeaMonkey before 223 do not recognize a user's removal of trust from an EV X509 certificate, which makes it easier for man-in-the-middle attackers to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user ...