CVE Vulnerabilities

CVE-2014-1491

Inadequate Encryption Strength

Published: Feb 06, 2014 | Modified: Jul 31, 2020
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V3
Ubuntu
MEDIUM

Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value.

Weakness

The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.

Affected Software

Name Vendor Start Version End Version
Firefox Mozilla * 27.0 (excluding)
Firefox_esr Mozilla * 24.3 (excluding)
Network_security_services Mozilla * 3.15.4 (excluding)
Seamonkey Mozilla * 2.24 (excluding)
Thunderbird Mozilla * 24.3.0 (excluding)
Red Hat Enterprise Linux 5 RedHat nss-0:3.16.1-2.el5 *
Red Hat Enterprise Linux 6 RedHat nspr-0:4.10.6-1.el6_5 *
Red Hat Enterprise Linux 6 RedHat nss-0:3.16.1-4.el6_5 *
Red Hat Enterprise Linux 6 RedHat nss-util-0:3.16.1-1.el6_5 *
RHEV 3.X Hypervisor and Agents for RHEL-6 RedHat rhev-hypervisor6-0:6.5-20140725.0.el6ev *
Firefox Ubuntu lucid *
Firefox Ubuntu precise *
Firefox Ubuntu quantal *
Firefox Ubuntu saucy *
Firefox Ubuntu upstream *
Nss Ubuntu upstream *
Thunderbird Ubuntu devel *
Thunderbird Ubuntu lucid *
Thunderbird Ubuntu precise *
Thunderbird Ubuntu quantal *
Thunderbird Ubuntu saucy *
Thunderbird Ubuntu upstream *

Potential Mitigations

References