Lucene search

K
mozillaMozilla FoundationMFSA2006-33
HistoryJun 01, 2006 - 12:00 a.m.

HTTP response smuggling — Mozilla

2006-06-0100:00:00
Mozilla Foundation
www.mozilla.org
9

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

0.123 Low

EPSS

Percentile

95.4%

Kazuho Oku of Cybozu Labs reports via the Information-technology Promotion Agency, Japan, that Firefox is vulnerable to HTTP response smuggling when used with certain proxy servers.

Affected configurations

Vulners
Node
mozillafirefoxRange<1.5.0.4
OR
mozillaseamonkeyRange<1.0.2
OR
mozillathunderbirdRange<1.5.0.4

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

0.123 Low

EPSS

Percentile

95.4%