First published: Wed Nov 21 2012(Updated: )
The HZ-GB-2312 character-set implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 does not properly handle a ~ (tilde) character in proximity to a chunk delimiter, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <17.0 | |
Firefox | >=10.0<10.0.11 | |
Mozilla SeaMonkey | <2.14 | |
Thunderbird | <17.0 | |
Mozilla Thunderbird | >=10.0<10.0.11 | |
SUSE Linux | =11.4 | |
SUSE Linux | =12.1 | |
SUSE Linux | =12.2 | |
SUSE Linux Enterprise Desktop | =10-sp4 | |
SUSE Linux Enterprise Desktop | =11-sp2 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Software Development Kit | =10-sp4 | |
SUSE Linux Enterprise Software Development Kit | =11-sp2 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server EUS | =6.3 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Debian | =6.0 | |
Debian | =7.0 | |
Ubuntu | =10.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Firefox ESR | >=10.0<10.0.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2012-4207 is classified as moderate.
To fix CVE-2012-4207, update to Mozilla Firefox versions 17.0 or later, Thunderbird 17.0 or later, and SeaMonkey 2.14 or later.
CVE-2012-4207 affects Mozilla Firefox versions prior to 17.0, Thunderbird prior to 17.0, and SeaMonkey prior to 2.14.
Yes, CVE-2012-4207 affects Firefox ESR 10.x versions before 10.0.11.
Yes, CVE-2012-4207 can be exploited remotely, allowing attackers to conduct various attacks.