Mozilla Firefox / Seamonkey Multiple Vulnerabilities
Last Update Date:
20 Nov 2013 10:54
Release Date:
20 Nov 2013
3904
Views
RISK: High Risk
TYPE: Clients - Browsers
Multiple vulnerabilities have been identified in Mozilla Firefox. A remote user can cause denial of service conditions and bypass security controls.
- When the verifylog feature is used when validating certificates, the system will use certificates that specify incompatible key usage constraints.
- On 64-bit systems, a remote user can create a specially crafted certificate that will trigger a certificate parsing error, attempting to write 4Gb of null characters.
- A remote user can trigger an integer truncation error in PL_ArenaAllocate in the Netscape Portable Runtime (NSPR) library code.
- The system prioritizes RC4 at a level higher than it should, which may facilitate plaintext or key recovery attacks.
Impact
- Denial of Service
- Security Restriction Bypass
System / Technologies affected
- Firefox versions prior to 25.0.1
- Seamonkey versions prior to 2.22.1
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- The vendor has issued a fix (Firefox 25.0.1, Seamonkey 2.22.1).
Vulnerability Identifier
Source
Related Link
Share with