CVE Vulnerabilities

CVE-2014-1491

Inadequate Encryption Strength

Published: Feb 06, 2014 | Modified: Nov 25, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value.

Weakness

The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.

Affected Software

NameVendorStart VersionEnd Version
FirefoxMozilla*24.3 (excluding)
FirefoxMozilla*27.0 (excluding)
Network_security_servicesMozilla*3.15.4 (excluding)
SeamonkeyMozilla*2.24 (excluding)
ThunderbirdMozilla*24.3.0 (excluding)
Red Hat Enterprise Linux 5RedHatnss-0:3.16.1-2.el5*
Red Hat Enterprise Linux 6RedHatnspr-0:4.10.6-1.el6_5*
Red Hat Enterprise Linux 6RedHatnss-0:3.16.1-4.el6_5*
Red Hat Enterprise Linux 6RedHatnss-util-0:3.16.1-1.el6_5*
RHEV 3.X Hypervisor and Agents for RHEL-6RedHatrhev-hypervisor6-0:6.5-20140725.0.el6ev*
FirefoxUbuntulucid*
FirefoxUbuntuprecise*
FirefoxUbuntuquantal*
FirefoxUbuntusaucy*
FirefoxUbuntuupstream*
NssUbuntuupstream*
ThunderbirdUbuntudevel*
ThunderbirdUbuntulucid*
ThunderbirdUbuntuprecise*
ThunderbirdUbuntuquantal*
ThunderbirdUbuntusaucy*
ThunderbirdUbuntuupstream*

Potential Mitigations

References