4.3
CVSSv2

CVE-2014-1582

Published: 15/10/2014 Updated: 22/12/2016
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The Public Key Pinning (PKP) implementation in Mozilla Firefox prior to 33.0 does not properly consider the connection-coalescing behavior of SPDY and HTTP/2 in the case of a shared IP address, which allows man-in-the-middle malicious users to bypass an intended pinning configuration and spoof a web site by providing a valid certificate from an arbitrary recognized Certification Authority.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox 31.0

mozilla firefox 30.0

mozilla firefox

mozilla firefox 31.1.0

Vendor Advisories

Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Mozilla Foundation Security Advisory 2014-80 Key pinning bypasses Announced October 14, 2014 Reporter Patrick McManus, David Keeler Impact Moderate Products Firefox, SeaMonkey Fixed in ...
The Public Key Pinning (PKP) implementation in Mozilla Firefox before 330 does not properly consider the connection-coalescing behavior of SPDY and HTTP/2 in the case of a shared IP address, which allows man-in-the-middle attackers to bypass an intended pinning configuration and spoof a web site by providing a valid certificate from an arbitrary r ...