Описание
The nsDocShell::OnRedirectStateChange function in docshell/base/nsDocShell.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to spoof the SSL security status of a document via vectors involving multiple requests, a redirect, and the history.back and history.forward JavaScript functions.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 6 | firefox | Affected | ||
| Red Hat Enterprise Linux Extended Update Support 4.8 | firefox | Affected | ||
| Red Hat Enterprise Linux Extended Update Support 5.5 | firefox | Affected | ||
| Red Hat Enterprise Linux 3 | seamonkey | Fixed | RHSA-2010:0546 | 21.07.2010 |
| Red Hat Enterprise Linux 4 | seamonkey | Fixed | RHSA-2010:0546 | 21.07.2010 |
| Red Hat Enterprise Linux 4 | firefox | Fixed | RHSA-2010:0547 | 21.07.2010 |
| Red Hat Enterprise Linux 5 | firefox | Fixed | RHSA-2010:0547 | 21.07.2010 |
| Red Hat Enterprise Linux 5 | xulrunner | Fixed | RHSA-2010:0547 | 21.07.2010 |
Показывать по
Дополнительная информация
Статус:
2.6 Low
CVSS2
Связанные уязвимости
The nsDocShell::OnRedirectStateChange function in docshell/base/nsDocShell.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to spoof the SSL security status of a document via vectors involving multiple requests, a redirect, and the history.back and history.forward JavaScript functions.
The nsDocShell::OnRedirectStateChange function in docshell/base/nsDocShell.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to spoof the SSL security status of a document via vectors involving multiple requests, a redirect, and the history.back and history.forward JavaScript functions.
The nsDocShell::OnRedirectStateChange function in docshell/base/nsDocS ...
The nsDocShell::OnRedirectStateChange function in docshell/base/nsDocShell.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to spoof the SSL security status of a document via vectors involving multiple requests, a redirect, and the history.back and history.forward JavaScript functions.
2.6 Low
CVSS2