Revision Date: | 2014-10-06 | Version: | 30 |
Title: | Mozilla Firefox 4.x through 11.0, Thunderbird 5.0 through 11.0, and SeaMonkey before 2.9 do not properly construct the Origin and Sec-WebSocket-Origin HTTP headers, which might allow remote attackers to bypass an IPv6 literal ACL via a cross-site (1) XMLHttpRequest or (2) WebSocket operation involving a nonstandard port number and an IPv6 address that contains certain zero fields. |
Description: | Mozilla Firefox 4.x through 11.0, Thunderbird 5.0 through 11.0, and SeaMonkey before 2.9 do not properly construct the Origin and Sec-WebSocket-Origin HTTP headers, which might allow remote attackers to bypass an IPv6 literal ACL via a cross-site (1) XMLHttpRequest or (2) WebSocket operation involving a nonstandard port number and an IPv6 address that contains certain zero fields. |
Family: | windows | Class: | vulnerability |
Status: | ACCEPTED | Reference(s): | CVE-2012-0475
|
Platform(s): | Microsoft Windows 2000 Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2012 Microsoft Windows Vista Microsoft Windows XP
| Product(s): | Mozilla Firefox Mozilla SeaMonkey Mozilla Thunderbird
|
Definition Synopsis |
Check for vulnerable Thunderbird Mozilla Thunderbird Mainline release is installed
AND Determine if the version of Mozilla Thunderbird is less than or equal to 11.0
AND Determine if the version of Mozilla Thunderbird is greater than or equal to 5.0
Check for vulnerable SeaMonkey
Mozilla Seamonkey is installed
AND Determine if the version of Mozilla Seamonkey is less than or equal to 2.9
Check for vulnerable Firefox
Mozilla Firefox Mainline release is installed
AND Mozilla Firefox Mainline version is less than or equal to 11.0
AND Mozilla Firefox Mainline version is greater than or equal to 4.0
|