CVE-2005-2395

NameCVE-2005-2395
DescriptionMozilla Firefox 1.0.4 and 1.0.5 does not choose the challenge with the strongest authentication scheme available as required by RFC2617, which might cause credentials to be sent in plaintext even if an encrypted channel is available.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)
Debian Bugs320538, 320539

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firefox (PTS)sid61.0-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firefoxsource(unstable)(unfixed)unimportant320539
iceweaselsource(unstable)(unfixed)unimportant320539
mozillasource(unstable)(unfixed)unimportant320538
mozilla-firefoxsource(unstable)1.4.99+1.5rc3.dfsg-2unimportant320539

Notes

Firefox and Mozilla follow RFC behaviour. This is more a lack of security
feature (client-side preference for stronger methods) and not a vulnerabilit
This also seems like a rare setup.

Search for package or bug name: Reporting problems