Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Mozilla Firefox Security Advisory (MFSA2015-150) - Linux

Information

Severity

Severity

Medium

Family

Family

General

CVSSv2 Base

CVSSv2 Base

4.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:P/A:N

Solution Type

Solution Type

Vendor Patch

Created

Created

2 years ago

Modified

Modified

2 years ago

Summary

This host is missing a security update for Mozilla Firefox.

Insight

Insight

MD5 signatures accepted within TLS 1.2 ServerKeyExchange in server signature Security researcher Karthikeyan Bhargavan reported an issue in Network Security Services (NSS) where MD5 signatures in the server signature within the TLS 1.2 ServerKeyExchange message are still accepted. This is an issue since NSS has officially disallowed the accepting MD5 as a hash algorithm in signatures since 2011. This issues exposes NSS based clients such as Firefox to theoretical collision-based forgery attacks. This issue was fixed in NSS version 3.20.2.

Affected Software

Affected Software

Firefox version(s) below 43.0.2.

Detection Method

Detection Method

Checks if a vulnerable package version is present on the target host.

Solution

Solution

The vendor has released an update. Please see the reference(s) for more information.

Common Vulnerabilities and Exposures (CVE)