Уязвимость спуфинга из-за некорректной обработки событий onLocationChange в браузерах Mozilla Firefox и SeaMonkey
Описание
В браузерах Mozilla Firefox и SeaMonkey существует уязвимость, связанная с некорректной обработкой событий onLocationChange
во время навигации между различными HTTPS-сайтами. Это позволяет злоумышленникам подделывать информацию X.509 сертификатов в адресной строке с помощью специально созданной веб-страницы.
Затронутые версии ПО
- Mozilla Firefox до версии 15.0
- Firefox ESR 10.x до версии 10.0.7
- SeaMonkey до версии 2.12
Тип уязвимости
Спуфинг информации в адресной строке
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Third Party Advisory
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdfThird Party Advisory
- Issue TrackingVendor Advisory
- Third Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Third Party Advisory
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdfThird Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
Одно из
EPSS
4.3 Medium
CVSS2
Дефекты
Связанные уязвимости
Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly handle onLocationChange events during navigation between different https sites, which allows remote attackers to spoof the X.509 certificate information in the address bar via a crafted web page.
Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly handle onLocationChange events during navigation between different https sites, which allows remote attackers to spoof the X.509 certificate information in the address bar via a crafted web page.
Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMo ...
Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly handle onLocationChange events during navigation between different https sites, which allows remote attackers to spoof the X.509 certificate information in the address bar via a crafted web page.
EPSS
4.3 Medium
CVSS2