First published: Mon Jul 06 2015(Updated: )
Last updated 24 July 2024
Credit: security@mozilla.org security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/icedove | ||
debian/iceweasel | ||
Mozilla Firefox | <=38.1.0 | |
Oracle Solaris | =11.3 | |
Mozilla Firefox ESR | =31.0 | |
Mozilla Firefox ESR | =31.1 | |
Mozilla Firefox ESR | =31.1.0 | |
Mozilla Firefox ESR | =31.1.1 | |
Mozilla Firefox ESR | =31.2 | |
Mozilla Firefox ESR | =31.3 | |
Mozilla Firefox ESR | =31.3.0 | |
Mozilla Firefox ESR | =31.4 | |
Mozilla Firefox ESR | =31.5 | |
Mozilla Firefox ESR | =31.5.1 | |
Mozilla Firefox ESR | =31.5.2 | |
Mozilla Firefox ESR | =31.5.3 | |
Mozilla Firefox ESR | =31.6.0 | |
Mozilla Firefox ESR | =31.7.0 | |
Mozilla Firefox ESR | =38.0 | |
Mozilla Firefox | =31.0 | |
Mozilla Firefox | =31.1.0 | |
Mozilla Firefox | =31.1.1 | |
Mozilla Firefox | =31.3.0 | |
Mozilla Firefox | =31.5.1 | |
Mozilla Firefox | =31.5.2 | |
Mozilla Firefox | =31.5.3 | |
Mozilla Firefox | =38.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2741 is a vulnerability in Mozilla Firefox, Firefox ESR, and Thunderbird that allows user-assisted man-in-the-middle attackers to bypass access restrictions.
The severity of CVE-2015-2741 is medium with a CVSS score of 4.3.
CVE-2015-2741 allows attackers to bypass key pinning by triggering a user dialog with an X.509 certificate problem.
To fix CVE-2015-2741, update Mozilla Firefox to version 39.0 or later, or update Thunderbird to version 31.8 or later.
More information about CVE-2015-2741 can be found on the MITRE CVE website and the Mozilla security advisories.