First published: Sun Jan 13 2013(Updated: )
The gPluginHandler.handleEvent function in the plugin handler in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not properly enforce the Same Origin Policy, which allows remote attackers to conduct clickjacking attacks via crafted JavaScript code that listens for a mutation event.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <17.0.2 | |
Firefox | <18.0 | |
Mozilla SeaMonkey | <2.15 | |
Thunderbird | <17.0.2 | |
Mozilla Thunderbird | <17.0.2 | |
openSUSE | =11.4 | |
openSUSE | =12.1 | |
openSUSE | =12.2 | |
SUSE Linux Enterprise Desktop | =10-sp4 | |
SUSE Linux Enterprise Desktop | =11-sp2 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Software Development Kit | =10-sp4 | |
SUSE Linux Enterprise Software Development Kit | =11-sp2 | |
Ubuntu | =10.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Firefox ESR | <17.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0747 is classified as a high severity vulnerability due to its potential impact on the Same Origin Policy enforcement.
To fix CVE-2013-0747, users should update to the latest version of Mozilla Firefox, Firefox ESR, Thunderbird, Thunderbird ESR, or SeaMonkey.
CVE-2013-0747 affects Mozilla Firefox versions prior to 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, and other related software.
Yes, CVE-2013-0747 allows remote attackers to exploit the vulnerability to bypass the Same Origin Policy.
Yes, versions of openSUSE prior to 11.4 and certain SUSE Linux distributions may be at risk from CVE-2013-0747.