[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

HTTP response splitting vulnerability in Mozilla Firefox, Thunderbird and SeaMonkey via crafted header values

ID: oval:org.secpod.oval:def:2694Date: (C)2011-11-09   (M)2024-03-27
Class: VULNERABILITYFamily: windows




The host is installed with Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 and is prone to a HTTP response splitting vulnerability. A flaw is present in the applications, which fail to handle HTTP responses that contain multiple Location, Content-Length, or Content-Disposition headers. Successful exploitation could allow attackers to conduct HTTP response splitting attacks.

Platform:
Microsoft Windows Server 2022
Microsoft Windows 11
Microsoft Windows Server 2019
Microsoft Windows Server 2016
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows 10
Product:
Mozilla Firefox
Mozilla SeaMonkey
Mozilla Thunderbird
Reference:
CVE-2011-3000
CVE    1
CVE-2011-3000
CPE    195
cpe:/a:mozilla:firefox:3.6.20
cpe:/a:mozilla:firefox:3.6.21
cpe:/a:mozilla:seamonkey:::x86
cpe:/a:mozilla:thunderbird:1.0
...

© SecPod Technologies