Mozilla Firefox 7.0 and Thunderbird 7.0, when the Direct2D (aka D2D) API is used on Windows in conjunction with the Azure graphics back-end, allow remote attackers to bypass the Same Origin Policy, and obtain sensitive image data from a different domain, by inserting this data into a canvas. NOTE: this issue exists because of a CVE-2011-2986 regression.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html - | |
References | () http://www.mozilla.org/security/announce/2011/mfsa2011-50.html - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/50591 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=655836 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14025 - |
Information
Published : 2011-11-09 11:55
Updated : 2024-11-21 01:30
NVD link : CVE-2011-3649
Mitre link : CVE-2011-3649
CVE.ORG link : CVE-2011-3649
JSON object : View
Products Affected
mozilla
- thunderbird
- firefox
microsoft
- windows
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor