MEDIUM · 5.9

CVE-2013-6673

Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it ea...

Vulnerability Description

Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it easier for man-in-the-middle attackers to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user.

CVSS Score

5.9

MEDIUM

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
HIGH
Availability
NONE

Affected Products

VendorProductVersions
FedoraprojectFedora18
MozillaFirefox< 26.0
MozillaSeamonkey< 2.23
MozillaThunderbird< 24.2
SuseSuse Linux Enterprise Software Development Kit11.0
OpensuseOpensuse12.2
SuseLinux Enterprise Desktop11
SuseLinux Enterprise Server11
CanonicalUbuntu Linux12.04

Related Weaknesses (CWE)

References

FAQ

What is CVE-2013-6673?

CVE-2013-6673 is a vulnerability with a CVSS score of 5.9 (MEDIUM). Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it ea...

How severe is CVE-2013-6673?

CVE-2013-6673 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2013-6673?

Check the references section above for vendor advisories and patch information. Affected products include: Fedoraproject Fedora, Mozilla Firefox, Mozilla Seamonkey, Mozilla Thunderbird, Suse Suse Linux Enterprise Software Development Kit.