The crypto.generateCRMFRequest method in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not properly validate a certain key type, which allows remote attackers to cause a denial of service (application crash) via vectors that trigger generation of a key that supports the Elliptic Curve ec-dual-use algorithm.
2014-03-19T10:55:06.350
2025-04-12T10:46:40.837
Deferred
CVSSv2: 5.0 (MEDIUM)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | suse | linux_enterprise_desktop | 11 | Yes |
Operating System | suse | linux_enterprise_server | 11 | Yes |
Operating System | suse | linux_enterprise_server | 11 | Yes |
Operating System | suse | linux_enterprise_software_development_kit | 11 | Yes |
Operating System | oracle | solaris | 11.3 | Yes |
Operating System | opensuse | opensuse | 13.1 | Yes |
Operating System | opensuse_project | opensuse | 11.4 | Yes |
Operating System | opensuse_project | opensuse | 12.3 | Yes |
Application | mozilla | seamonkey | < 2.25 | Yes |
Application | mozilla | firefox | < 28.0 | Yes |