Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2012-0475 | First vendor Publication | 2012-04-25 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 2.6 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Mozilla Firefox 4.x through 11.0, Thunderbird 5.0 through 11.0, and SeaMonkey before 2.9 do not properly construct the Origin and Sec-WebSocket-Origin HTTP headers, which might allow remote attackers to bypass an IPv6 literal ACL via a cross-site (1) XMLHttpRequest or (2) WebSocket operation involving a nonstandard port number and an IPv6 address that contains certain zero fields. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0475 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-264 | Permissions, Privileges, and Access Controls |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:16279 | |||
Oval ID: | oval:org.mitre.oval:def:16279 | ||
Title: | Mozilla Firefox 4.x through 11.0, Thunderbird 5.0 through 11.0, and SeaMonkey before 2.9 do not properly construct the Origin and Sec-WebSocket-Origin HTTP headers, which might allow remote attackers to bypass an IPv6 literal ACL via a cross-site (1) XMLHttpRequest or (2) WebSocket operation involving a nonstandard port number and an IPv6 address that contains certain zero fields. | ||
Description: | Mozilla Firefox 4.x through 11.0, Thunderbird 5.0 through 11.0, and SeaMonkey before 2.9 do not properly construct the Origin and Sec-WebSocket-Origin HTTP headers, which might allow remote attackers to bypass an IPv6 literal ACL via a cross-site (1) XMLHttpRequest or (2) WebSocket operation involving a nonstandard port number and an IPv6 address that contains certain zero fields. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-0475 | Version: | 20 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows XP Microsoft Windows 2000 Microsoft Windows 8 Microsoft Windows Server 2012 | Product(s): | Mozilla Firefox Mozilla Thunderbird Mozilla SeaMonkey |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-12-04 | Name : Ubuntu Update for mozilla-devscripts USN-1430-5 File : nvt/gb_ubuntu_USN_1430_5.nasl |
2012-06-15 | Name : Ubuntu Update for apparmor USN-1430-4 File : nvt/gb_ubuntu_USN_1430_4.nasl |
2012-05-08 | Name : Ubuntu Update for thunderbird USN-1430-3 File : nvt/gb_ubuntu_USN_1430_3.nasl |
2012-05-02 | Name : Mozilla Products Security Bypass Vulnerability - May12 (Mac OS X) File : nvt/gb_mozilla_prdts_sec_bypass_vuln_may12_macosx.nasl |
2012-05-02 | Name : Mozilla Products Security Bypass Vulnerability - May12 (Windows) File : nvt/gb_mozilla_prdts_sec_bypass_vuln_may12_win.nasl |
2012-04-30 | Name : FreeBSD Ports: firefox File : nvt/freebsd_firefox65.nasl |
2012-04-30 | Name : Ubuntu Update for firefox USN-1430-1 File : nvt/gb_ubuntu_USN_1430_1.nasl |
2012-04-30 | Name : Ubuntu Update for ubufox USN-1430-2 File : nvt/gb_ubuntu_USN_1430_2.nasl |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-254.nasl - Type : ACT_GATHER_INFO |
2013-01-08 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201301-01.nasl - Type : ACT_GATHER_INFO |
2012-11-30 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1430-5.nasl - Type : ACT_GATHER_INFO |
2012-06-13 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1430-4.nasl - Type : ACT_GATHER_INFO |
2012-06-04 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_firefox10-201205-8154.nasl - Type : ACT_GATHER_INFO |
2012-05-07 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1430-3.nasl - Type : ACT_GATHER_INFO |
2012-05-03 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_firefox-201204-120426.nasl - Type : ACT_GATHER_INFO |
2012-04-30 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1430-1.nasl - Type : ACT_GATHER_INFO |
2012-04-30 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1430-2.nasl - Type : ACT_GATHER_INFO |
2012-04-27 | Name : The remote Mac OS X host contains a web browser that is affected by multiple ... File : macosx_firefox_12_0.nasl - Type : ACT_GATHER_INFO |
2012-04-27 | Name : The remote Mac OS X host contains a mail client that is potentially affected ... File : macosx_thunderbird_12_0.nasl - Type : ACT_GATHER_INFO |
2012-04-27 | Name : The remote Windows host contains a web browser that is affected by multiple v... File : mozilla_firefox_120.nasl - Type : ACT_GATHER_INFO |
2012-04-27 | Name : The remote Windows host contains a mail client that is potentially affected b... File : mozilla_thunderbird_120.nasl - Type : ACT_GATHER_INFO |
2012-04-27 | Name : The remote Windows host contains a web browser that is affected by multiple v... File : seamonkey_29.nasl - Type : ACT_GATHER_INFO |
2012-04-25 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_380e8c568e3211e195804061862b8c22.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:02:12 |
|
2024-11-28 12:28:40 |
|
2024-08-02 12:18:52 |
|
2024-08-02 01:05:34 |
|
2024-02-02 01:18:19 |
|
2024-02-01 12:05:26 |
|
2023-09-05 12:17:17 |
|
2023-09-05 01:05:18 |
|
2023-09-02 12:17:17 |
|
2023-09-02 01:05:24 |
|
2023-08-12 12:21:02 |
|
2023-08-12 01:05:24 |
|
2023-08-11 12:17:24 |
|
2023-08-11 01:05:34 |
|
2023-08-06 12:16:43 |
|
2023-08-06 01:05:25 |
|
2023-08-04 12:16:47 |
|
2023-08-04 01:05:26 |
|
2023-07-14 12:16:46 |
|
2023-07-14 01:05:22 |
|
2023-03-29 01:18:43 |
|
2023-03-28 12:05:31 |
|
2022-10-11 12:14:58 |
|
2022-10-11 01:05:06 |
|
2021-05-04 12:19:06 |
|
2021-04-22 01:22:48 |
|
2020-05-23 01:47:59 |
|
2020-05-23 00:32:45 |
|
2017-12-19 09:22:07 |
|
2017-11-21 12:03:44 |
|
2017-09-19 09:25:09 |
|
2016-06-28 18:59:51 |
|
2016-04-26 21:26:50 |
|
2014-06-14 13:32:16 |
|
2014-02-17 11:07:39 |
|
2013-11-04 21:22:03 |
|
2013-05-10 22:32:41 |
|
2012-12-19 13:24:07 |
|