First published: Tue Feb 19 2013(Updated: )
Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow man-in-the-middle attackers to spoof the address bar by operating a proxy server that provides a 407 HTTP status code accompanied by web script, as demonstrated by a phishing attack on an HTTPS site.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <17.0.3 | |
Firefox | <19.0 | |
Mozilla SeaMonkey | <2.16 | |
Thunderbird | <17.0.3 | |
Mozilla Thunderbird | <17.0.3 | |
SUSE Linux | =11.4 | |
SUSE Linux | =12.1 | |
SUSE Linux | =12.2 | |
Red Hat Enterprise Linux | =5.9 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server EUS | =5.9 | |
Red Hat Enterprise Linux Server EUS | =6.3 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Debian | =7.0 | |
Ubuntu | =10.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Firefox ESR | <17.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0776 is classified as a moderate severity vulnerability that allows man-in-the-middle attacks.
To fix CVE-2013-0776, update your Mozilla Firefox, Thunderbird, or SeaMonkey to the latest version that addresses this vulnerability.
CVE-2013-0776 affects Mozilla Firefox versions prior to 19.0, Firefox ESR versions before 17.0.3, Thunderbird versions before 17.0.3, and SeaMonkey versions before 2.16.
CVE-2013-0776 enables man-in-the-middle attackers to spoof the address bar by modifying HTTP responses.
There is no official workaround for CVE-2013-0776, so updating to the latest version is strongly recommended.