4.3
CVSSv2

CVE-2015-2741

Published: 06/07/2015 Updated: 28/12/2016
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Mozilla Firefox prior to 39.0, Firefox ESR 38.x prior to 38.1, and Thunderbird prior to 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle malicious users to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox

oracle solaris 11.3

mozilla firefox esr 38.0

mozilla firefox esr 31.4

mozilla firefox esr 31.3.0

mozilla firefox esr 31.5.3

mozilla firefox esr 31.5.2

mozilla firefox esr 31.1.1

mozilla firefox esr 31.1.0

mozilla firefox esr 31.5.1

mozilla firefox esr 31.5

mozilla firefox esr 31.1

mozilla firefox esr 31.0

mozilla firefox esr 31.7.0

mozilla firefox esr 31.6.0

mozilla firefox esr 31.3

mozilla firefox esr 31.2

Vendor Advisories

Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Mozilla Foundation Security Advisory 2015-67 Key pinning is ignored when overridable errors are encountered Announced July 2, 2015 Reporter David Keeler Impact Moderate Products Firefox, Firefox ESR, SeaMonkey, Thunderbird ...
It was found that Firefox skipped key-pinning checks when handling an error that could be overridden by the user (for example an expired certificate error) This flaw allowed a user to override a pinned certificate, which is an action the user should not be able to perform ...