Описание
The event-management implementation in Mozilla Firefox before 3.6.20, SeaMonkey 2.x, Thunderbird 3.x before 3.1.12, and possibly other products does not properly select the context for script to run in, which allows remote attackers to bypass the Same Origin Policy or execute arbitrary JavaScript code with chrome privileges via a crafted web site.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux Extended Update Support 5.7 | firefox | Affected | ||
Red Hat Enterprise Linux Extended Update Support 6.1 | firefox | Affected | ||
Red Hat Enterprise Linux 4 | firefox | Fixed | RHSA-2011:1164 | 16.08.2011 |
Red Hat Enterprise Linux 5 | firefox | Fixed | RHSA-2011:1164 | 16.08.2011 |
Red Hat Enterprise Linux 5 | xulrunner | Fixed | RHSA-2011:1164 | 16.08.2011 |
Red Hat Enterprise Linux 6 | firefox | Fixed | RHSA-2011:1164 | 16.08.2011 |
Red Hat Enterprise Linux 6 | xulrunner | Fixed | RHSA-2011:1164 | 16.08.2011 |
Показывать по
Дополнительная информация
Статус:
6.8 Medium
CVSS2
Связанные уязвимости
The event-management implementation in Mozilla Firefox before 3.6.20, SeaMonkey 2.x, Thunderbird 3.x before 3.1.12, and possibly other products does not properly select the context for script to run in, which allows remote attackers to bypass the Same Origin Policy or execute arbitrary JavaScript code with chrome privileges via a crafted web site.
The event-management implementation in Mozilla Firefox before 3.6.20, SeaMonkey 2.x, Thunderbird 3.x before 3.1.12, and possibly other products does not properly select the context for script to run in, which allows remote attackers to bypass the Same Origin Policy or execute arbitrary JavaScript code with chrome privileges via a crafted web site.
The event-management implementation in Mozilla Firefox before 3.6.20, ...
The event-management implementation in Mozilla Firefox before 3.6.20, SeaMonkey 2.x, Thunderbird 3.x before 3.1.12, and possibly other products does not properly select the context for script to run in, which allows remote attackers to bypass the Same Origin Policy or execute arbitrary JavaScript code with chrome privileges via a crafted web site.
6.8 Medium
CVSS2