First published: Wed Nov 21 2012(Updated: )
Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 do not prevent use of a "top" frame name-attribute value to access the location property, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a binary plugin.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <17.0 | |
Firefox | >=10.0<10.0.11 | |
Mozilla SeaMonkey | <2.14 | |
Thunderbird | <17.0 | |
Mozilla Thunderbird | >=10.0<10.0.11 | |
SUSE Linux | =11.4 | |
SUSE Linux | =12.1 | |
SUSE Linux | =12.2 | |
SUSE Linux Enterprise Desktop | =10-sp4 | |
SUSE Linux Enterprise Desktop | =11-sp2 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Software Development Kit | =10-sp4 | |
SUSE Linux Enterprise Software Development Kit | =11-sp2 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server EUS | =6.3 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Ubuntu | =10.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Firefox ESR | >=10.0<10.0.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4209 is classified as a medium severity vulnerability due to its potential for exploitation via cross-site scripting attacks.
To fix CVE-2012-4209, users should update their Mozilla Firefox, Thunderbird, or SeaMonkey to the latest versions that address the vulnerability.
The affected versions of software include Mozilla Firefox versions before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14.
CVE-2012-4209 can be exploited to conduct cross-site scripting attacks, potentially allowing remote attackers to execute arbitrary code.
Currently, the best practice is to update to a patched version since there are no effective workarounds to mitigate the vulnerability.