Certificate spoofing vulnerability in the address bar in Mozilla Firefox, Thunderbird and SeaMonkey via a crafted web page - MFSA 2012-69 (Mac OS X)ID: oval:org.secpod.oval:def:6901 | Date: (C)2012-09-06 (M)2023-11-19 |
Class: PATCH | Family: macos |
The host is missing a security update according to Mozilla advisory, MFSA 2012-69. The update is required to fix a certificate spoofing vulnerability. A flaw is present in the applications, which fail to properly handle onLocationChange events during navigation between different https sites. Successful exploitation could allow attackers to spoof the X.509 certificate information in the address bar.
Platform: |
Apple Mac OS 14 |
Apple Mac OS 13 |
Apple Mac OS 12 |
Apple Mac OS 11 |
Apple Mac OS X 10.15 |
Apple Mac OS X 10.14 |
Apple Mac OS X 10.13 |
Apple Mac OS X 10.11 |
Apple Mac OS X 10.12 |
Product: |
Mozilla SeaMonkey |
Mozilla Firefox |