Lucene search

K
cve[email protected]CVE-2012-0458
HistoryMar 14, 2012 - 7:55 p.m.

CVE-2012-0458

2012-03-1419:55:02
CWE-264
web.nvd.nist.gov
47
mozilla firefox
thunderbird
cve-2012-0458
remote code execution
security vulnerability

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

9.4 High

AI Score

Confidence

High

0.013 Low

EPSS

Percentile

85.7%

Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict setting the home page through the dragging of a URL to the home button, which allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a javascript: URL that is later interpreted in the about:sessionrestore context.

Affected configurations

NVD
Node
mozillafirefoxRange3.6.27
Node
mozillafirefoxRange4.010.0
Node
mozillafirefox_esrMatch10.0
OR
mozillafirefox_esrMatch10.0.1
OR
mozillafirefox_esrMatch10.0.2
Node
mozillathunderbirdRange1.03.1.19
Node
mozillathunderbirdRange5.010.0
Node
mozillathunderbird_esrMatch10.0
OR
mozillathunderbird_esrMatch10.0.1
OR
mozillathunderbird_esrMatch10.0.2
Node
mozillaseamonkeyMatch-
OR
mozillaseamonkeyMatch1.0
OR
mozillaseamonkeyMatch1.0alpha
OR
mozillaseamonkeyMatch1.0beta
OR
mozillaseamonkeyMatch1.0.1
OR
mozillaseamonkeyMatch1.0.2
OR
mozillaseamonkeyMatch1.0.3
OR
mozillaseamonkeyMatch1.0.4
OR
mozillaseamonkeyMatch1.0.5
OR
mozillaseamonkeyMatch1.0.6
OR
mozillaseamonkeyMatch1.0.7
OR
mozillaseamonkeyMatch1.0.8
OR
mozillaseamonkeyMatch1.0.9
OR
mozillaseamonkeyMatch1.1
OR
mozillaseamonkeyMatch1.1alpha
OR
mozillaseamonkeyMatch1.1beta
OR
mozillaseamonkeyMatch1.1.1
OR
mozillaseamonkeyMatch1.1.2
OR
mozillaseamonkeyMatch1.1.3
OR
mozillaseamonkeyMatch1.1.4
OR
mozillaseamonkeyMatch1.1.5
OR
mozillaseamonkeyMatch1.1.6
OR
mozillaseamonkeyMatch1.1.7
OR
mozillaseamonkeyMatch1.1.8
OR
mozillaseamonkeyMatch1.1.9
OR
mozillaseamonkeyMatch1.1.10
OR
mozillaseamonkeyMatch1.1.11
OR
mozillaseamonkeyMatch1.1.12
OR
mozillaseamonkeyMatch1.1.13
OR
mozillaseamonkeyMatch1.1.14
OR
mozillaseamonkeyMatch1.1.15
OR
mozillaseamonkeyMatch1.1.16
OR
mozillaseamonkeyMatch1.1.17
OR
mozillaseamonkeyMatch1.1.18
OR
mozillaseamonkeyMatch1.1.19
OR
mozillaseamonkeyMatch1.5.0.8
OR
mozillaseamonkeyMatch1.5.0.9
OR
mozillaseamonkeyMatch1.5.0.10
OR
mozillaseamonkeyMatch2.0
OR
mozillaseamonkeyMatch2.0alpha_1
OR
mozillaseamonkeyMatch2.0alpha_2
OR
mozillaseamonkeyMatch2.0alpha_3
OR
mozillaseamonkeyMatch2.0beta_1
OR
mozillaseamonkeyMatch2.0beta_2
OR
mozillaseamonkeyMatch2.0rc1
OR
mozillaseamonkeyMatch2.0rc2
OR
mozillaseamonkeyMatch2.0.1
OR
mozillaseamonkeyMatch2.0.2
OR
mozillaseamonkeyMatch2.0.3
OR
mozillaseamonkeyMatch2.0.4
OR
mozillaseamonkeyMatch2.0.5
OR
mozillaseamonkeyMatch2.0.6
OR
mozillaseamonkeyMatch2.0.7
OR
mozillaseamonkeyMatch2.0.8
OR
mozillaseamonkeyMatch2.0.9
OR
mozillaseamonkeyMatch2.0.10
OR
mozillaseamonkeyMatch2.0.11
OR
mozillaseamonkeyMatch2.0.12
OR
mozillaseamonkeyMatch2.0.13
OR
mozillaseamonkeyMatch2.0.14
OR
mozillaseamonkeyMatch2.1
OR
mozillaseamonkeyMatch2.1alpha1
OR
mozillaseamonkeyMatch2.1alpha2
OR
mozillaseamonkeyMatch2.1alpha3
OR
mozillaseamonkeyMatch2.1beta1
OR
mozillaseamonkeyMatch2.1beta2
OR
mozillaseamonkeyMatch2.1beta3
OR
mozillaseamonkeyMatch2.1rc1
OR
mozillaseamonkeyMatch2.1rc2
OR
mozillaseamonkeyMatch2.2
OR
mozillaseamonkeyMatch2.2beta1
OR
mozillaseamonkeyMatch2.2beta2
OR
mozillaseamonkeyMatch2.2beta3
OR
mozillaseamonkeyMatch2.3
OR
mozillaseamonkeyMatch2.3beta1
OR
mozillaseamonkeyMatch2.3beta2
OR
mozillaseamonkeyMatch2.3beta3
OR
mozillaseamonkeyMatch2.3.1
OR
mozillaseamonkeyMatch2.3.2
OR
mozillaseamonkeyMatch2.3.3
OR
mozillaseamonkeyMatch2.4
OR
mozillaseamonkeyMatch2.4beta1
OR
mozillaseamonkeyMatch2.4beta2
OR
mozillaseamonkeyMatch2.4beta3
OR
mozillaseamonkeyMatch2.4.1
OR
mozillaseamonkeyMatch2.5
OR
mozillaseamonkeyMatch2.5beta1
OR
mozillaseamonkeyMatch2.5beta2
OR
mozillaseamonkeyMatch2.5beta3
OR
mozillaseamonkeyMatch2.5beta4
OR
mozillaseamonkeyMatch2.6
OR
mozillaseamonkeyMatch2.6beta1
OR
mozillaseamonkeyMatch2.6beta2
OR
mozillaseamonkeyMatch2.6beta3
OR
mozillaseamonkeyMatch2.6beta4
OR
mozillaseamonkeyMatch2.6.1
OR
mozillaseamonkeyMatch2.7
OR
mozillaseamonkeyMatch2.7beta1
OR
mozillaseamonkeyMatch2.7beta2
OR
mozillaseamonkeyMatch2.7beta3
OR
mozillaseamonkeyMatch2.7beta4
OR
mozillaseamonkeyMatch2.7beta5
OR
mozillaseamonkeyMatch2.7.1
OR
mozillaseamonkeyMatch2.7.2
CPENameOperatorVersion
mozilla:firefoxmozilla firefoxle3.6.27

References

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

9.4 High

AI Score

Confidence

High

0.013 Low

EPSS

Percentile

85.7%