[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252271

 
 

909

 
 

196835

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2012:170 -- Mandriva firefox

ID: oval:org.secpod.oval:def:1300139Date: (C)2013-01-01   (M)2022-10-10
Class: PATCHFamily: unix




Multiple security issue were identified and fixed in mozilla firefox: Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 do not prevent use of the valueOf method to shadow the location object , which makes it easier for remote attackers to conduct cross-site scripting attacks via vectors involving a plugin . The nsLocation::CheckURL function in Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 does not properly determine the calling document and principal in its return value, which makes it easier for remote attackers to conduct cross-site scripting attacks via a crafted web site, and makes it easier for remote attackers to execute arbitrary JavaScript code by leveraging certain add-on behavior . Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 allow remote attackers to bypass the Same Origin Policy and read the Location object via a prototype property-injection attack that defeats certain protection mechanisms for this object . The mozilla firefox packages has been upgraded to the latest version which is unaffected by these security flaws.

Platform:
Mandriva Enterprise Server 5.2
Product:
firefox
Reference:
MDVSA-2012:170
CVE-2012-4194
CVE-2012-4195
CVE-2012-4196
CVE    3
CVE-2012-4194
CVE-2012-4196
CVE-2012-4195
CPE    1
cpe:/o:mandriva:enterprise_server:5.2

© SecPod Technologies