Lucene search

K
mozillaMozilla FoundationMFSA2014-19
HistoryMar 18, 2014 - 12:00 a.m.

Spoofing attack on WebRTC permission prompt — Mozilla

2014-03-1800:00:00
Mozilla Foundation
www.mozilla.org
28

4.3 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.006 Low

EPSS

Percentile

78.4%

Mozilla developer Ehsan Akhgari reported a spoofing attack where the permission prompt for a WebRTC session can appear to be from a different site than its actual originating site if a timed navigation occurs during the prompt generation. This allows an attacker to potentially gain access to the webcam or microphone by masquerading as another site and gaining user permission through spoofing.

Affected configurations

Vulners
Node
mozillafirefoxRange<28
OR
mozillaseamonkeyRange<2.25
CPENameOperatorVersion
firefoxlt28
seamonkeylt2.25

4.3 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.006 Low

EPSS

Percentile

78.4%