Date published: 2015-01-14T06:59:10.633-05:00
Date last modified: 2017-09-07T21:29:26.450-04:00
CVSS Score: 4.3
Principal attack vector: NETWORK
Reference URL: http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html
Summary: Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not consider the id-pkix-ocsp-nocheck extension in deciding whether to trust an OCSP responder, which makes it easier for remote attackers to obtain sensitive information by sniffing the network during a session in which there was an incorrect decision to accept a compromised and revoked certificate.