Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products, when the Direct2D (aka D2D) API is used on Windows, allows remote attackers to bypass the Same Origin Policy, and obtain sensitive image data from a different domain, by inserting this data into a canvas.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 01:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html - | |
References | () http://secunia.com/advisories/49055 - | |
References | () http://www.mozilla.org/security/announce/2011/mfsa2011-29.html - Vendor Advisory | |
References | () http://www.mozilla.org/security/announce/2011/mfsa2011-31.html - | |
References | () http://www.mozilla.org/security/announce/2011/mfsa2011-33.html - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=655836 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14497 - |
Information
Published : 2011-08-18 18:55
Updated : 2024-11-21 01:29
NVD link : CVE-2011-2986
Mitre link : CVE-2011-2986
CVE.ORG link : CVE-2011-2986
JSON object : View
Products Affected
mozilla
- seamonkey
- thunderbird
- firefox
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor