First published: Thu Sep 13 2007(Updated: )
Mozilla Firefox before Firefox 2.0.0.13, and SeaMonkey before 1.1.9, can automatically install TLS client certificates with minimal user interaction, and automatically sends these certificates when requested, which makes it easier for remote web sites to track user activities across domains by requesting the TLS client certificates from other domains.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <=2.0.0.12 | |
Firefox | =0.1 | |
Firefox | =0.8 | |
Firefox | =1.5-beta2 | |
Firefox | =1.5.2 | |
Firefox | =1.5.0.6 | |
Firefox | =1.8 | |
Firefox | =2.0.0.2 | |
Firefox | =1.5.0.10 | |
Firefox | =1.5.0.3 | |
Firefox | =1.5.0.11 | |
Firefox | =1.4.1 | |
Firefox | =1.5.4 | |
Firefox | =1.0.2 | |
Firefox | =1.5-beta1 | |
Firefox | =1.5 | |
Firefox | =0.9.1 | |
Firefox | =1.0.4 | |
Firefox | =2.0.0.7 | |
Firefox | =1.0.7 | |
Firefox | =2.0.0.9 | |
Firefox | =0.10.1 | |
Firefox | =0.9 | |
Firefox | =1.5.6 | |
Firefox | =0.7 | |
Firefox | =0.2 | |
Firefox | =0.3 | |
Firefox | =1.0 | |
Firefox | =1.5.0.7 | |
Firefox | =2.0 | |
Firefox | =1.0.1 | |
Firefox | =0.6 | |
Firefox | =0.7.1 | |
Firefox | =1.5.0.8 | |
Firefox | =2.0.0.3 | |
Firefox | =1.5.0.9 | |
Firefox | =1.5.0.5 | |
Firefox | =1.5.7 | |
Firefox | =1.5.0.12 | |
Firefox | =2.0.0.6 | |
Firefox | =2.0.0.11 | |
Firefox | =1.5.0.2 | |
Firefox | =1.0.3 | |
Firefox | =2.0.0.4 | |
Firefox | =0.5 | |
Firefox | =0.6.1 | |
Firefox | =1.5.1 | |
Firefox | =0.9.3 | |
Firefox | =2.0.0.1 | |
Firefox | =1.5.5 | |
Firefox | =0.9.2 | |
Firefox | =1.0-preview_release | |
Firefox | =2.0.0.8 | |
Firefox | =0.9-rc | |
Firefox | =1.5.8 | |
Firefox | =1.5.3 | |
Firefox | =0.4 | |
Firefox | =1.5.0.4 | |
Firefox | =1.5.0.1 | |
Firefox | =0.10 | |
Firefox | =1.0.5 | |
Firefox | =2.0.0.5 | |
Firefox | =2.0.0.10 | |
Firefox | =1.0.6 | |
Firefox | =1.0.8 | |
Mozilla SeaMonkey | =1.0.3 | |
Mozilla SeaMonkey | =1.0.1 | |
Mozilla SeaMonkey | =1.1.7 | |
Mozilla SeaMonkey | =1.0.6 | |
Mozilla SeaMonkey | =1.0.9 | |
Mozilla SeaMonkey | =1.1.3 | |
Mozilla SeaMonkey | =1.0 | |
Mozilla SeaMonkey | =1.1.5 | |
Mozilla SeaMonkey | =1.0.7 | |
Mozilla SeaMonkey | =1.0-beta | |
Mozilla SeaMonkey | =1.1-alpha | |
Mozilla SeaMonkey | =1.0-alpha | |
Mozilla SeaMonkey | =1.1 | |
Mozilla SeaMonkey | =1.1.2 | |
Mozilla SeaMonkey | =1.0.2 | |
Mozilla SeaMonkey | =1.0.8 | |
Mozilla SeaMonkey | =1.1-beta | |
Mozilla SeaMonkey | =1.1.1 | |
Mozilla SeaMonkey | =1.0.5 | |
Mozilla SeaMonkey | =1.1.6 | |
Mozilla SeaMonkey | =1.0.4 | |
Mozilla SeaMonkey | <=1.1.8 | |
Mozilla SeaMonkey | =1.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4879 is considered to be of medium severity as it can compromise user privacy when TLS client certificates are automatically used.
To fix CVE-2007-4879, users should upgrade to Mozilla Firefox version 2.0.0.13 or later, or SeaMonkey version 1.1.9 or later.
CVE-2007-4879 affects Mozilla Firefox versions prior to 2.0.0.13 and SeaMonkey versions prior to 1.1.9.
The risk associated with CVE-2007-4879 is that it allows remote websites to track user activities via automatically sent TLS client certificates.
Users of affected versions of Mozilla Firefox and SeaMonkey are impacted by CVE-2007-4879 due to the potential for privacy violations.