First published: Wed Jan 14 2015(Updated: )
Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not consider the id-pkix-ocsp-nocheck extension in deciding whether to trust an OCSP responder, which makes it easier for remote attackers to obtain sensitive information by sniffing the network during a session in which there was an incorrect decision to accept a compromised and revoked certificate.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla SeaMonkey | <=2.31 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
Mozilla Firefox | <=34.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8642 is classified as a moderate severity vulnerability that can lead to sensitive information leakage.
To mitigate CVE-2014-8642, update Mozilla Firefox to version 35.0 or newer, or SeaMonkey to version 2.32 or newer.
CVE-2014-8642 affects Mozilla Firefox versions before 35.0 and SeaMonkey versions before 2.32, as well as specific openSUSE releases.
CVE-2014-8642 can facilitate remote attackers in obtaining sensitive information by exploiting improper trust decisions in OCSP responses.
Check your version of Mozilla Firefox or SeaMonkey to see if it is below the specified fixed versions for CVE-2014-8642.