CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
AI Score
Confidence
High
EPSS
Percentile
70.8%
The evalInSandbox implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 uses an incorrect context during the handling of JavaScript code that sets the location.href property, which allows remote attackers to conduct cross-site scripting (XSS) attacks or read arbitrary files by leveraging a sandboxed add-on.
Vendor | Product | Version | CPE |
---|---|---|---|
mozilla | firefox | * | cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* |
mozilla | firefox_esr | * | cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* |
mozilla | seamonkey | * | cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:* |
mozilla | thunderbird | * | cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* |
mozilla | thunderbird_esr | * | cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:* |
opensuse | opensuse | 11.4 | cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* |
opensuse | opensuse | 12.1 | cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:* |
opensuse | opensuse | 12.2 | cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:* |
suse | linux_enterprise_desktop | 10 | cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:* |
suse | linux_enterprise_desktop | 11 | cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:* |
lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
osvdb.org/87594
rhn.redhat.com/errata/RHSA-2012-1482.html
rhn.redhat.com/errata/RHSA-2012-1483.html
secunia.com/advisories/51359
secunia.com/advisories/51360
secunia.com/advisories/51369
secunia.com/advisories/51370
secunia.com/advisories/51381
secunia.com/advisories/51434
secunia.com/advisories/51439
secunia.com/advisories/51440
www.debian.org/security/2012/dsa-2583
www.debian.org/security/2012/dsa-2584
www.debian.org/security/2012/dsa-2588
www.mandriva.com/security/advisories?name=MDVSA-2012:173
www.mozilla.org/security/announce/2012/mfsa2012-93.html
www.securityfocus.com/bid/56618
www.ubuntu.com/usn/USN-1636-1
www.ubuntu.com/usn/USN-1638-1
www.ubuntu.com/usn/USN-1638-2
www.ubuntu.com/usn/USN-1638-3
bugzilla.mozilla.org/show_bug.cgi?id=747607
exchange.xforce.ibmcloud.com/vulnerabilities/80171
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15995