DescriptionMozilla Firefox 1.0.4 and 1.0.5 does not choose the challenge with the strongest authentication scheme available as required by RFC2617, which might cause credentials to be sent in plaintext even if an encrypted channel is available.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)
Debian Bugs320538, 320539

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firefox (PTS)sid59.0.2-1vulnerable
iceweasel (PTS)wheezy, wheezy (security)38.8.0esr-1~deb7u1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


Firefox and Mozilla follow RFC behaviour. This is more a lack of security
feature (client-side preference for stronger methods) and not a vulnerabilit
This also seems like a rare setup.

Search for package or bug name: Reporting problems