Improper Certificate Validation Affecting firefox package, versions <0:17.0.3-1.el6_3


Severity

Recommended
critical

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.23% (62nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL6-FIREFOX-1454051
  • published26 Jul 2021
  • disclosed19 Feb 2013

Introduced: 19 Feb 2013

CVE-2013-0776  (opens in a new tab)
CWE-295  (opens in a new tab)

How to fix?

Upgrade RHEL:6 firefox to version 0:17.0.3-1.el6_3 or higher.
This issue was patched in RHSA-2013:0271.

NVD Description

Note: Versions mentioned in the description apply only to the upstream firefox package and not the firefox package as distributed by RHEL. See How to fix? for RHEL:6 relevant fixed versions and status.

Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow man-in-the-middle attackers to spoof the address bar by operating a proxy server that provides a 407 HTTP status code accompanied by web script, as demonstrated by a phishing attack on an HTTPS site.

CVSS Scores

version 3.1