[Forgot Password]
Login  Register Subscribe

25354

 
 

132811

 
 

146396

 
 

909

 
 

117043

 
 

156

Paid content will be excluded from the download.


Download | Alert*
OVAL

Session-fixation vulnerability in Mozilla Products - MFSA 2015-04

ID: oval:org.secpod.oval:def:23589Date: (C)2015-02-23   (M)2020-05-26
Class: PATCHFamily: windows




The host is missing a security update according to Mozilla advisory, MFSA 2015-04. The update is required to fix a session-fixation vulnerability. A flaw is present in the applications, which do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code. Successful exploitation allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.

Platform:
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows 7
Microsoft Windows Server 2008 R2
Microsoft Windows 8
Microsoft Windows Server 2012
Microsoft Windows 8.1
Microsoft Windows Server 2012 R2
Microsoft Windows 10
Product:
Mozilla Thunderbird
Mozilla Firefox ESR
Mozilla Firefox
Mozilla SeaMonkey
Reference:
MFSA 2015-04
CVE-2014-8639
CVE    1
CVE-2014-8639
CPE    11
cpe:/a:mozilla:seamonkey:2.31
cpe:/a:mozilla:seamonkey:::x86
cpe:/a:mozilla:thunderbird:::x86
cpe:/a:mozilla:firefox:34.0.5
...

© SecPod Technologies