Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2011-2993 | First vendor Publication | 2011-08-18 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The implementation of digital signatures for JAR files in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, and possibly other products does not prevent calls from unsigned JavaScript code to signed code, which allows remote attackers to bypass the Same Origin Policy and gain privileges via a crafted web site, a different vulnerability than CVE-2008-2801. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2993 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-264 | Permissions, Privileges, and Access Controls |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:14055 | |||
Oval ID: | oval:org.mitre.oval:def:14055 | ||
Title: | The implementation of digital signatures for JAR files in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, and possibly other products does not prevent calls from unsigned JavaScript code to signed code, which allows remote attackers to bypass the Same Origin Policy and gain privileges via a crafted web site, a different vulnerability than CVE-2008-2801. | ||
Description: | The implementation of digital signatures for JAR files in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, and possibly other products does not prevent calls from unsigned JavaScript code to signed code, which allows remote attackers to bypass the Same Origin Policy and gain privileges via a crafted web site, a different vulnerability than CVE-2008-2801. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2011-2993 | Version: | 18 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows XP Microsoft Windows 2000 | Product(s): | Mozilla Firefox Mozilla Seamonkey |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2011-10-21 | Name : Ubuntu Update for libvoikko USN-1192-3 File : nvt/gb_ubuntu_USN_1192_3.nasl |
2011-09-21 | Name : FreeBSD Ports: firefox File : nvt/freebsd_firefox58.nasl |
2011-09-09 | Name : Mozilla Products Information Disclosure and Security Bypass Vulnerabilities (... File : nvt/gb_mozilla_prdts_sec_bypass_n_info_disc_vuln_win.nasl |
2011-09-07 | Name : SuSE Update for MozillaFirefox,MozillaThunderbird,seamonkey SUSE-SA:2011:037 File : nvt/gb_suse_2011_037.nasl |
2011-08-19 | Name : Fedora Update for firefox FEDORA-2011-11106 File : nvt/gb_fedora_2011_11106_firefox_fc15.nasl |
2011-08-19 | Name : Fedora Update for gnome-python2-extras FEDORA-2011-11106 File : nvt/gb_fedora_2011_11106_gnome-python2-extras_fc15.nasl |
2011-08-19 | Name : Fedora Update for mozvoikko FEDORA-2011-11106 File : nvt/gb_fedora_2011_11106_mozvoikko_fc15.nasl |
2011-08-19 | Name : Fedora Update for perl-Gtk2-MozEmbed FEDORA-2011-11106 File : nvt/gb_fedora_2011_11106_perl-Gtk2-MozEmbed_fc15.nasl |
2011-08-19 | Name : Fedora Update for xulrunner FEDORA-2011-11106 File : nvt/gb_fedora_2011_11106_xulrunner_fc15.nasl |
2011-08-19 | Name : Ubuntu Update for firefox USN-1192-1 File : nvt/gb_ubuntu_USN_1192_1.nasl |
2011-08-19 | Name : Ubuntu Update for mozvoikko USN-1192-2 File : nvt/gb_ubuntu_USN_1192_2.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
74596 | Mozilla Multiple Products JAR Digital Signature Same Origin Policy Bypass Pri... Mozilla Firefox, Thunderbird and SeaMonkey contain a flaw that may allow an attacker to gain access to unauthorized privileges. The issue is triggered when an attacker uses malicious JavaScript, hosted on a crafted website, to call code within a signed JAR file that was cached from a trusted site. The malicious JavaScript then inherits the privileges of the JAR file and an elevation of privileges occurs, allowing a remote attacker to inherit the trust of the site hosting the JAR file and gain privileges granted to it by the user. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_seamonkey-110819.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_MozillaFirefox-110819.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_seamonkey-110819.nasl - Type : ACT_GATHER_INFO |
2013-01-08 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201301-01.nasl - Type : ACT_GATHER_INFO |
2011-10-20 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1192-3.nasl - Type : ACT_GATHER_INFO |
2011-08-18 | Name : The remote Windows host contains a web browser that is affected by multiple v... File : mozilla_firefox_60.nasl - Type : ACT_GATHER_INFO |
2011-08-18 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1192-1.nasl - Type : ACT_GATHER_INFO |
2011-08-18 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1192-2.nasl - Type : ACT_GATHER_INFO |
2011-08-17 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_834591a9c82f11e0897d6c626dd55a41.nasl - Type : ACT_GATHER_INFO |
2011-08-17 | Name : The remote Windows host contains a web browser that is affected by multiple v... File : seamonkey_23.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:04:23 |
|
2024-11-28 12:26:35 |
|
2024-08-02 12:17:13 |
|
2024-08-02 01:04:58 |
|
2024-02-02 01:16:43 |
|
2024-02-01 12:04:50 |
|
2023-09-05 12:15:41 |
|
2023-09-05 01:04:43 |
|
2023-09-02 12:15:45 |
|
2023-09-02 01:04:47 |
|
2023-08-12 12:19:01 |
|
2023-08-12 01:04:48 |
|
2023-08-11 12:15:51 |
|
2023-08-11 01:04:57 |
|
2023-08-06 12:15:13 |
|
2023-08-06 01:04:48 |
|
2023-08-04 12:15:18 |
|
2023-08-04 01:04:49 |
|
2023-07-14 12:15:17 |
|
2023-07-14 01:04:47 |
|
2023-03-29 01:17:11 |
|
2023-03-28 12:04:53 |
|
2022-10-11 12:13:37 |
|
2022-10-11 01:04:32 |
|
2021-05-04 12:14:54 |
|
2021-04-22 01:16:14 |
|
2020-05-23 00:29:54 |
|
2017-09-19 09:24:42 |
|
2016-04-26 20:57:06 |
|
2014-06-14 13:31:15 |
|
2014-02-17 11:04:16 |
|
2013-05-10 23:04:58 |
|