The crypto.generateCRMFRequest method in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not properly validate a certain key type, which allows remote attackers to cause a denial of service (application crash) via vectors that trigger generation of a key that supports the Elliptic Curve ec-dual-use algorithm.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
No history.
Information
Published : 2014-03-19 10:55
Updated : 2025-04-12 10:46
NVD link : CVE-2014-1498
Mitre link : CVE-2014-1498
CVE.ORG link : CVE-2014-1498
JSON object : View
Products Affected
opensuse
- opensuse
oracle
- solaris
suse
- linux_enterprise_desktop
- linux_enterprise_server
- linux_enterprise_software_development_kit
opensuse_project
- opensuse
mozilla
- firefox
- seamonkey
CWE
CWE-347
Improper Verification of Cryptographic Signature