First published: Wed Oct 10 2012(Updated: )
The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not prevent access to properties of a prototype for a standard class, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <10.0.8 | |
Mozilla Thunderbird | <10.0.8 | |
Firefox | <16.0 | |
Thunderbird | <16.0 | |
Mozilla SeaMonkey | <2.13 | |
Ubuntu | =10.04 | |
Ubuntu | =11.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server EUS | =6.3 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
SUSE Linux Enterprise Desktop | =10-sp4 | |
SUSE Linux Enterprise Desktop | =11-sp3 | |
SUSE Linux Enterprise Software Development Kit | =10-sp4 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp3 | |
Firefox ESR | <10.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4184 has a moderate severity rating, indicating potential risks to affected applications.
To fix CVE-2012-4184, update affected software such as Mozilla Firefox, Thunderbird, or SeaMonkey to the latest version.
CVE-2012-4184 affects Mozilla Firefox versions before 16.0, Firefox ESR versions before 10.0.8, Thunderbird versions before 16.0, and SeaMonkey versions before 2.13.
The impact of CVE-2012-4184 allows remote attackers to access properties of a prototype for a standard class, potentially leading to information disclosure.
CVE-2012-4184 is no longer a risk if all affected software has been updated to versions that patch this vulnerability.