First published: Wed Nov 21 2012(Updated: )
Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 assign the system principal, rather than the sandbox principal, to XMLHttpRequest objects created in sandboxes, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks or obtain sensitive information by leveraging a sandboxed add-on.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <17.0 | |
Mozilla SeaMonkey | <2.14 | |
Thunderbird | <17.0 | |
Ubuntu | =10.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
SUSE Linux | =11.4 | |
SUSE Linux | =12.1 | |
SUSE Linux | =12.2 | |
SUSE Linux Enterprise Desktop | =10-sp4 | |
SUSE Linux Enterprise Desktop | =11-sp2 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Software Development Kit | =11-sp2 | |
SUSE Linux Enterprise Software Development Kit | =11-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4205 is classified as a moderate severity vulnerability due to its potential for cross-site request forgery attacks.
To fix CVE-2012-4205, update Mozilla Firefox, Thunderbird, or SeaMonkey to the latest version above 17.0 or 2.14, respectively.
CVE-2012-4205 affects Mozilla Firefox versions before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14, along with specific versions of Ubuntu and openSUSE.
CVE-2012-4205 can enable remote attackers to conduct cross-site request forgery (CSRF) attacks.
Concerns should focus on versions of Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14, as well as the specified versions of Ubuntu and openSUSE.