[arch-security] [ASA-201504-4] firefox: certificate verification	bypass
    Remi Gacogne 
    rgacogne at archlinux.org
       
    Sat Apr  4 12:49:16 UTC 2015
    
    
  
Arch Linux Security Advisory ASA-201504-4
=========================================
Severity: Critical
Date    : 2015-04-04
CVE-ID  : CVE-2015-0799
Package : firefox
Type    : certificate verification bypass
Remote  : Yes
Link    : https://wiki.archlinux.org/index.php/CVE
Summary
=======
The package firefox before version 37.0.1-1 is vulnerable to certificate
verification bypass.
Resolution
==========
Upgrade to 37.0.1-1.
# pacman -Syu "firefox>=37.0.1-1"
The problem has been fixed upstream in version 37.0.1.
Workaround
==========
None.
Description
===========
Security researcher Muneaki Nishimura discovered a flaw in the Mozilla's
HTTP Alternative Services implementation. If an Alt-Svc header is
specified in the HTTP/2 response, SSL certificate verification can be
bypassed for the specified alternate server. As a result of this,
warnings of invalid SSL certificates will not be displayed and an
attacker could potentially impersonate another site through a
man-in-the-middle (MTIM), replacing the original certificate with their own.
Impact
======
A remote attacker in position of man-in-the-middle can impersonate
another site, bypassing certificate validation.
References
==========
https://www.mozilla.org/en-US/security/advisories/mfsa2015-44/
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0799
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20150404/22f3eb49/attachment.asc>
    
    
More information about the arch-security
mailing list