First published: Wed Jul 22 2009(Updated: )
Mozilla Firefox before 3.0.12 does not always use XPCCrossOriginWrapper when required during object construction, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted document, related to a "cross origin wrapper bypass."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <3.0.12 | |
Fedora | =10 | |
SUSE Linux Enterprise Debuginfo | =10-sp2 | |
SUSE Linux Enterprise Debuginfo | =11 | |
openSUSE | =11.0 | |
openSUSE | =11.1 | |
SUSE Linux Enterprise Desktop with Beagle | =10-sp2 | |
SUSE Linux Enterprise Desktop with Beagle | =11 | |
SUSE Linux Enterprise Server | =10-sp2 | |
SUSE Linux Enterprise Server | =11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2472 is considered to be of medium severity due to its potential for cross-site scripting (XSS) attacks.
To fix CVE-2009-2472, upgrade Mozilla Firefox to version 3.0.12 or later.
CVE-2009-2472 affects all versions of Mozilla Firefox prior to 3.0.12.
Yes, CVE-2009-2472 can lead to data theft through cross-site scripting exploits.
CVE-2009-2472 can compromise user safety by allowing attackers to execute malicious scripts under the context of a trusted website.