New Search

Mozilla Firefox 4.x through 11.0 Thunderbird 5.0 through 11.0 and SeaMonkey before 2.9 do not properly construct the Origin and Sec-WebSocket-Origin HTTP headers which might allow remote attackers to bypass an IPv6 literal ACL via a cross-site (1) XMLHttpRequest or (2) WebSocket operation involving a nonstandard port number and an IPv6 address that contains certain zero fields.

oval:org.mitre.oval:def:16279

Mozilla Firefox 4.x through 11.0 Thunderbird 5.0 through 11.0 and SeaMonkey before 2.9 do not properly construct the Origin and Sec-WebSocket-Origin HTTP headers which might allow remote attackers to bypass an IPv6 literal ACL via a cross-site (1) XMLHttpRequest or (2) WebSocket operation involving a nonstandard port number and an IPv6 address that contains certain zero fields.

Family:
windows
Status:
ACCEPTED
Platform(s):
  • Microsoft Windows Server 2012
  • Microsoft Windows Server 2008
  • Microsoft Windows 2000
  • Microsoft Windows Vista
  • Microsoft Windows Server 2003
  • Microsoft Windows 8
  • Microsoft Windows 7
  • Microsoft Windows XP
Class:
vulnerability
Reference(s):
  • CVE-2012-0475
Product(s):
  • Mozilla Thunderbird
  • Mozilla SeaMonkey
  • Mozilla Firefox