Lucene search

K
mozillaMozilla FoundationMFSA2015-44
HistoryApr 03, 2015 - 12:00 a.m.

Certificate verification bypass through the HTTP/2 Alt-Svc header — Mozilla

2015-04-0300:00:00
Mozilla Foundation
www.mozilla.org
27

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.001

Percentile

50.8%

Security researcher Muneaki Nishimura discovered a flaw in the Mozilla’s HTTP Alternative Services implementation. If an Alt-Svc header is specified in the HTTP/2 response, SSL certificate verification can be bypassed for the specified alternate server. As a result of this, warnings of invalid SSL certificates will not be displayed and an attacker could potentially impersonate another site through a man-in-the-middle (MTIM), replacing the original certificate with their own.

Affected configurations

Vulners
Node
mozillafirefoxRange<37.0.1
OR
mozillaseamonkeyRange<2.35

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.001

Percentile

50.8%