Mozilla Firefox 4.x through 11.0, Thunderbird 5.0 through 11.0, and SeaMonkey before 2.9 do not properly construct the Origin and Sec-WebSocket-Origin HTTP headers, which might allow remote attackers to bypass an IPv6 literal ACL via a cross-site (1) XMLHttpRequest or (2) WebSocket operation involving a nonstandard port number and an IPv6 address that contains certain zero fields.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 01:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/48972 - | |
References | () http://secunia.com/advisories/49047 - | |
References | () http://secunia.com/advisories/49055 - | |
References | () http://www.mozilla.org/security/announce/2012/mfsa2012-28.html - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/53230 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=694576 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/75153 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16279 - |
Information
Published : 2012-04-25 10:10
Updated : 2024-11-21 01:35
NVD link : CVE-2012-0475
Mitre link : CVE-2012-0475
CVE.ORG link : CVE-2012-0475
JSON object : View
Products Affected
mozilla
- thunderbird
- firefox
- seamonkey
CWE
CWE-264
Permissions, Privileges, and Access Controls