Vulnerability CVE-2015-0812


Published: 2015-04-01

Description:
Mozilla Firefox before 37.0 does not require an HTTPS session for lightweight theme add-on installations, which allows man-in-the-middle attackers to bypass an intended user-confirmation requirement by deploying a crafted web site and conducting a DNS spoofing attack against a mozilla.org subdomain.

Type:

CWE-17

(Code)

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Opensuse -> Opensuse 
Novell -> Opensuse 
Mozilla -> Firefox 
Canonical -> Ubuntu linux 

 References:
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html
http://www.mozilla.org/security/announce/2015/mfsa2015-32.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securitytracker.com/id/1031996
http://www.ubuntu.com/usn/USN-2550-1
https://bugzilla.mozilla.org/show_bug.cgi?id=1128126
https://security.gentoo.org/glsa/201512-10

Copyright 2024, cxsecurity.com

 

Back to Top