[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

Address spoofing vulnerability in Mozilla Firefox, ESR, Thunderbird, ESR and Seamonkey - MFSA 2013-27 (Mac OS X)

ID: oval:org.secpod.oval:def:9950Date: (C)2013-03-19   (M)2023-12-07
Class: PATCHFamily: macos




The host is missing a security update according to Mozilla advisory, MFSA 2013-27. The update is required to fix address spoofing vulnerability. A flaw is present in the applications, which fail to handle a proxy server that provides a 407 HTTP status code accompanied by web script. Successful exploitation allows attackers to disable HTTPS effectively.

Platform:
Apple Mac OS 14
Apple Mac OS 13
Apple Mac OS 12
Apple Mac OS 11
Apple Mac OS X 10.15
Apple Mac OS X 10.14
Apple Mac OS X 10.13
Apple Mac OS X 10.11
Apple Mac OS X 10.12
Product:
Mozilla Firefox
Mozilla Firefox ESR
Mozilla SeaMonkey
Mozilla Thunderbird
Mozilla Thunderbird ESR
Reference:
MFSA 2013-27
CVE-2013-0776
CVE    1
CVE-2013-0776
CPE    475
cpe:/a:mozilla:firefox:14.0
cpe:/a:mozilla:seamonkey:2.8:beta6
cpe:/a:mozilla:firefox:3.6.20
cpe:/a:mozilla:firefox:3.6.21
...

© SecPod Technologies