First published: Tue Feb 19 2013(Updated: )
Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow man-in-the-middle attackers to spoof the address bar by operating a proxy server that provides a 407 HTTP status code accompanied by web script, as demonstrated by a phishing attack on an HTTPS site.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <19.0 | |
Mozilla Firefox ESR | <17.0.3 | |
Mozilla SeaMonkey | <2.16 | |
Mozilla Thunderbird | <17.0.3 | |
Mozilla Thunderbird Esr | <17.0.3 | |
openSUSE openSUSE | =11.4 | |
openSUSE openSUSE | =12.1 | |
openSUSE openSUSE | =12.2 | |
Redhat Enterprise Linux Aus | =5.9 | |
Redhat Enterprise Linux Desktop | =5.0 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Eus | =5.9 | |
Redhat Enterprise Linux Eus | =6.3 | |
Redhat Enterprise Linux Server | =5.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Workstation | =5.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Debian Debian Linux | =7.0 | |
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =11.10 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =12.10 | |
Mozilla Firefox | <17.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.