[Forgot Password]
Login  Register Subscribe

23631

 
 

117687

 
 

98250

 
 

909

 
 

79198

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

Address spoofing vulnerability in Mozilla Firefox, ESR, Thunderbird, ESR and Seamonkey - MFSA 2013-27 (Mac OS X)

ID: oval:org.secpod.oval:def:9950Date: (C)2013-03-19   (M)2017-11-17
Class: PATCHFamily: macos




The host is missing a security update according to Mozilla advisory, MFSA 2013-27. The update is required to fix address spoofing vulnerability. A flaw is present in the applications, which fail to handle a proxy server that provides a 407 HTTP status code accompanied by web script. Successful exploitation allows attackers to disable HTTPS effectively.

Platform:
Apple Mac OS X 10.8
Apple Mac OS X 10.9
Apple Mac OS X 10.10
Apple Mac OS X 10.11
Apple Mac OS X 10.12
Apple Mac OS X Server 10.8
Apple Mac OS X Server 10.9
Apple Mac OS X Server 10.10
Apple Mac OS X Server 10.11
Apple Mac OS X Server 10.12
Product:
Mozilla Firefox
Mozilla Firefox ESR
Mozilla SeaMonkey
Mozilla Thunderbird
Mozilla Thunderbird ESR
Reference:
MFSA 2013-27
CVE-2013-0776
CVE    1
CVE-2013-0776
CPE    475
cpe:/a:mozilla:firefox:14.0
cpe:/a:mozilla:firefox:0.8
cpe:/a:mozilla:firefox:0.7
cpe:/a:mozilla:firefox:0.9
...

© 2013 SecPod Technologies