[arch-security] [ASA-201504-4] firefox: certificate verification bypass
Remi Gacogne
rgacogne at archlinux.org
Sat Apr 4 12:49:16 UTC 2015
Arch Linux Security Advisory ASA-201504-4
=========================================
Severity: Critical
Date : 2015-04-04
CVE-ID : CVE-2015-0799
Package : firefox
Type : certificate verification bypass
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
Summary
=======
The package firefox before version 37.0.1-1 is vulnerable to certificate
verification bypass.
Resolution
==========
Upgrade to 37.0.1-1.
# pacman -Syu "firefox>=37.0.1-1"
The problem has been fixed upstream in version 37.0.1.
Workaround
==========
None.
Description
===========
Security researcher Muneaki Nishimura discovered a flaw in the Mozilla's
HTTP Alternative Services implementation. If an Alt-Svc header is
specified in the HTTP/2 response, SSL certificate verification can be
bypassed for the specified alternate server. As a result of this,
warnings of invalid SSL certificates will not be displayed and an
attacker could potentially impersonate another site through a
man-in-the-middle (MTIM), replacing the original certificate with their own.
Impact
======
A remote attacker in position of man-in-the-middle can impersonate
another site, bypassing certificate validation.
References
==========
https://www.mozilla.org/en-US/security/advisories/mfsa2015-44/
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0799
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20150404/22f3eb49/attachment.asc>
More information about the arch-security
mailing list