First published: Wed Oct 10 2012(Updated: )
Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly handle navigation away from a web page that has a SELECT element's menu active, which allows remote attackers to spoof page content via vectors involving absolute positioning and scrolling.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <16.0 | |
Mozilla SeaMonkey | <2.13 | |
Thunderbird | <16.0 | |
Ubuntu | =10.04 | |
Ubuntu | =11.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 | |
SUSE Linux Enterprise Desktop | =10-sp4 | |
SUSE Linux Enterprise Desktop | =11-sp2 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3984 has been rated as a high severity vulnerability due to its potential to allow content spoofing.
To fix CVE-2012-3984, upgrade to Mozilla Firefox 16.0, Thunderbird 16.0, or SeaMonkey 2.13 or newer versions.
The impact of CVE-2012-3984 is that attackers can manipulate the displayed content of a webpage, leading to phishing attacks or misinformation.
CVE-2012-3984 affects Mozilla Firefox versions before 16.0, Thunderbird versions before 16.0, and SeaMonkey versions before 2.13.
Yes, CVE-2012-3984 can be exploited remotely by attackers through crafted web pages.