9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.015 Low
EPSS
Percentile
86.5%
The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before
16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird
ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not properly
interact with failures of InstallTrigger methods, which allows remote
attackers to execute arbitrary JavaScript code with chrome privileges via a
crafted web site, related to an “XrayWrapper pollution” issue.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 10.04 | noarch | firefox | < 16.0+build1-0ubuntu0.10.04.1 | UNKNOWN |
ubuntu | 11.04 | noarch | firefox | < 16.0+build1-0ubuntu0.11.04.1 | UNKNOWN |
ubuntu | 11.10 | noarch | firefox | < 16.0+build1-0ubuntu0.11.10.1 | UNKNOWN |
ubuntu | 12.04 | noarch | firefox | < 16.0+build1-0ubuntu0.12.04.1 | UNKNOWN |
ubuntu | 12.10 | noarch | firefox | < 16.0+build1-0ubuntu1 | UNKNOWN |
ubuntu | 13.04 | noarch | firefox | < 16.0+build1-0ubuntu1 | UNKNOWN |
ubuntu | 13.10 | noarch | firefox | < 16.0+build1-0ubuntu1 | UNKNOWN |
ubuntu | 10.04 | noarch | thunderbird | < 16.0+build1-0ubuntu0.10.04.1 | UNKNOWN |
ubuntu | 11.04 | noarch | thunderbird | < 16.0+build1-0ubuntu0.11.04.1 | UNKNOWN |
ubuntu | 11.10 | noarch | thunderbird | < 16.0+build1-0ubuntu0.11.10.1 | UNKNOWN |