First published: Fri Oct 12 2012(Updated: )
Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <16.0.1 | |
Firefox | >=10.0<10.0.9 | |
Mozilla SeaMonkey | <2.13.1 | |
Thunderbird | <16.0.1 | |
Mozilla Thunderbird | >=10.0<10.0.9 | |
SUSE Linux Enterprise Desktop | =10-sp4 | |
SUSE Linux Enterprise Desktop | =11-sp2 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Software Development Kit | =10-sp4 | |
Ubuntu | =10.04 | |
Ubuntu | =11.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server EUS | =6.3 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Firefox ESR | >=10.0<10.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4193 is considered a high-severity vulnerability due to its potential to allow remote code execution.
To address CVE-2012-4193, update Mozilla Firefox to version 16.0.1 or later, Thunderbird to version 16.0.1 or later, and SeaMonkey to version 2.13.1 or later.
CVE-2012-4193 affects Mozilla Firefox versions prior to 16.0.1, Thunderbird versions prior to 16.0.1, and SeaMonkey versions prior to 2.13.1, among others.
CVE-2012-4193 can be exploited through specially crafted web pages that bypass security checks, leading to potential unauthorized actions.
The best workaround for CVE-2012-4193 is to upgrade affected software to the latest versions rather than relying on temporary fixes.