CVE-2009-2472

Mozilla Firefox before 3.0.12 does not always use XPCCrossOriginWrapper when required during object construction, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted document, related to a "cross origin wrapper bypass."
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2009-1162.html Broken Link
http://secunia.com/advisories/35914 Third Party Advisory
http://secunia.com/advisories/35944 Third Party Advisory
http://secunia.com/advisories/36005 Third Party Advisory
http://secunia.com/advisories/36145 Third Party Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-265068-1 Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020800.1-1 Broken Link
http://www.mozilla.org/security/announce/2009/mfsa2009-40.html Patch Vendor Advisory
http://www.securityfocus.com/bid/35758 Patch Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2009/1972 Patch Third Party Advisory
http://www.vupen.com/english/advisories/2009/2152 Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=479288 Issue Tracking Patch Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=481434 Issue Tracking Patch Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=497102 Issue Tracking Patch Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9497 Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01032.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2009-1162.html Broken Link
http://secunia.com/advisories/35914 Third Party Advisory
http://secunia.com/advisories/35944 Third Party Advisory
http://secunia.com/advisories/36005 Third Party Advisory
http://secunia.com/advisories/36145 Third Party Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-265068-1 Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020800.1-1 Broken Link
http://www.mozilla.org/security/announce/2009/mfsa2009-40.html Patch Vendor Advisory
http://www.securityfocus.com/bid/35758 Patch Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2009/1972 Patch Third Party Advisory
http://www.vupen.com/english/advisories/2009/2152 Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=479288 Issue Tracking Patch Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=481434 Issue Tracking Patch Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=497102 Issue Tracking Patch Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9497 Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01032.html Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*
cpe:2.3:a:suse:linux_enterprise_debuginfo:11:-:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*

History

21 Nov 2024, 01:04

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html - Mailing List, Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2009-1162.html - Broken Link () http://rhn.redhat.com/errata/RHSA-2009-1162.html - Broken Link
References () http://secunia.com/advisories/35914 - Third Party Advisory () http://secunia.com/advisories/35914 - Third Party Advisory
References () http://secunia.com/advisories/35944 - Third Party Advisory () http://secunia.com/advisories/35944 - Third Party Advisory
References () http://secunia.com/advisories/36005 - Third Party Advisory () http://secunia.com/advisories/36005 - Third Party Advisory
References () http://secunia.com/advisories/36145 - Third Party Advisory () http://secunia.com/advisories/36145 - Third Party Advisory
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-265068-1 - Broken Link () http://sunsolve.sun.com/search/document.do?assetkey=1-26-265068-1 - Broken Link
References () http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020800.1-1 - Broken Link () http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020800.1-1 - Broken Link
References () http://www.mozilla.org/security/announce/2009/mfsa2009-40.html - Patch, Vendor Advisory () http://www.mozilla.org/security/announce/2009/mfsa2009-40.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/35758 - Patch, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/35758 - Patch, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2009/1972 - Patch, Third Party Advisory () http://www.vupen.com/english/advisories/2009/1972 - Patch, Third Party Advisory
References () http://www.vupen.com/english/advisories/2009/2152 - Third Party Advisory () http://www.vupen.com/english/advisories/2009/2152 - Third Party Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=479288 - Issue Tracking, Patch, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=479288 - Issue Tracking, Patch, Vendor Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=481434 - Issue Tracking, Patch, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=481434 - Issue Tracking, Patch, Vendor Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=497102 - Issue Tracking, Patch, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=497102 - Issue Tracking, Patch, Vendor Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9497 - Third Party Advisory () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9497 - Third Party Advisory
References () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01032.html - Third Party Advisory () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01032.html - Third Party Advisory

Information

Published : 2009-07-22 18:30

Updated : 2024-11-21 01:04


NVD link : CVE-2009-2472

Mitre link : CVE-2009-2472

CVE.ORG link : CVE-2009-2472


JSON object : View

Products Affected

mozilla

  • firefox

opensuse

  • opensuse

suse

  • linux_enterprise_server
  • linux_enterprise_desktop
  • linux_enterprise_debuginfo

fedoraproject

  • fedora
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')