The txXPathNodeUtils::getXSLTId function in txMozillaXPathTreeWalker.cpp and txStandaloneXPathTreeWalker.cpp in Mozilla Firefox before 3.5.19, 3.6.x before 3.6.17, and 4.x before 4.0.1, and SeaMonkey before 2.0.14, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 01:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://scarybeastsecurity.blogspot.com/2011/03/multi-browser-heap-address-leak-in-xslt.html - Exploit | |
References | () http://www.mozilla.org/security/announce/2011/mfsa2011-18.html - Vendor Advisory | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=640339 - Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/66836 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14467 - |
Information
Published : 2011-04-15 20:55
Updated : 2024-11-21 01:26
NVD link : CVE-2011-1712
Mitre link : CVE-2011-1712
CVE.ORG link : CVE-2011-1712
JSON object : View
Products Affected
mozilla
- seamonkey
- firefox
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor