First published: Wed Oct 10 2012(Updated: )
Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly implement the HTML5 Same Origin Policy, which allows remote attackers to conduct cross-site scripting (XSS) attacks by leveraging initial-origin access after document.domain has been set.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <16.0 | |
Mozilla SeaMonkey | <2.13 | |
Thunderbird | <16.0 | |
Ubuntu | =10.04 | |
Ubuntu | =11.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 | |
SUSE Linux Enterprise Desktop | =10-sp4 | |
SUSE Linux Enterprise Desktop | =11-sp2 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3985 is considered a medium severity vulnerability due to its potential to allow cross-site scripting (XSS) attacks.
To fix CVE-2012-3985, ensure you are using an updated version of Mozilla Firefox, Thunderbird, or SeaMonkey that is 16.0 or later.
CVE-2012-3985 affects Mozilla Firefox versions prior to 16.0, Thunderbird versions prior to 16.0, and SeaMonkey versions prior to 2.13 on various Linux distributions.
CVE-2012-3985 can facilitate cross-site scripting (XSS) attacks, allowing attackers to execute scripts in the context of a user's session.
While CVE-2012-3985 has been patched in newer versions, users of outdated software are still at risk and should update immediately.