Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it easier for man-in-the-middle attackers to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user.
Metrics
Affected Vendors & Products
References
History
Tue, 25 Nov 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | ||
| Vendors & Products |
Mozilla firefox Esr
|
Status: PUBLISHED
Assigner: mozilla
Published: 2013-12-11T15:00:00
Updated: 2024-08-06T17:46:22.836Z
Reserved: 2013-11-05T00:00:00
Link: CVE-2013-6673
No data.
Status : Deferred
Published: 2013-12-11T15:55:13.323
Modified: 2025-11-25T17:50:16.803
Link: CVE-2013-6673