[arch-security] [ASA-201504-4] firefox: certificate verification bypass
rgacogne at archlinux.org
Sat Apr 4 12:49:16 UTC 2015
Arch Linux Security Advisory ASA-201504-4
Date : 2015-04-04
CVE-ID : CVE-2015-0799
Package : firefox
Type : certificate verification bypass
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
The package firefox before version 37.0.1-1 is vulnerable to certificate
Upgrade to 37.0.1-1.
# pacman -Syu "firefox>=37.0.1-1"
The problem has been fixed upstream in version 37.0.1.
Security researcher Muneaki Nishimura discovered a flaw in the Mozilla's
HTTP Alternative Services implementation. If an Alt-Svc header is
specified in the HTTP/2 response, SSL certificate verification can be
bypassed for the specified alternate server. As a result of this,
warnings of invalid SSL certificates will not be displayed and an
attacker could potentially impersonate another site through a
man-in-the-middle (MTIM), replacing the original certificate with their own.
A remote attacker in position of man-in-the-middle can impersonate
another site, bypassing certificate validation.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 819 bytes
Desc: OpenPGP digital signature
More information about the arch-security