The SSL implementation in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 does not properly set the minimum key length for Diffie-Hellman Ephemeral (DHE) mode, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox
secunia.com/advisories/41839
secunia.com/advisories/42867
support.avaya.com/css/P8/documents/100114250
support.avaya.com/css/P8/documents/100120156
www.debian.org/security/2010/dsa-2123
www.mandriva.com/security/advisories?name=MDVSA-2010:210
www.mandriva.com/security/advisories?name=MDVSA-2010:211
www.mozilla.org/security/announce/2010/mfsa2010-72.html
www.redhat.com/support/errata/RHSA-2010-0781.html
www.redhat.com/support/errata/RHSA-2010-0782.html
www.ubuntu.com/usn/USN-1007-1
www.vupen.com/english/advisories/2011/0061
bugzilla.mozilla.org/show_bug.cgi?id=554354
bugzilla.mozilla.org/show_bug.cgi?id=583337
bugzilla.mozilla.org/show_bug.cgi?id=587234
bugzilla.mozilla.org/show_bug.cgi?id=595300
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12118