First published: Thu Feb 06 2014(Updated: )
The file-download implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 does not properly restrict the timing of button selections, which allows remote attackers to conduct clickjacking attacks, and trigger unintended launching of a downloaded file, via a crafted web site.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE | =11.4 | |
openSUSE | =12.3 | |
openSUSE | =13.1 | |
SUSE Linux Enterprise Desktop with Beagle | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp3 | |
suse linux enterprise server vmware | =11-sp3 | |
SUSE Linux Enterprise Software Development Kit | =11-sp3 | |
Oracle Solaris SPARC | =11.3 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 | |
Ubuntu Linux | =13.10 | |
Mozilla Firefox | <27.0 | |
Mozilla SeaMonkey | <2.24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1480 has a medium severity rating as it allows for clickjacking attacks that can lead to unauthorized file downloads.
To fix CVE-2014-1480, update Mozilla Firefox to version 27.0 or later, or update SeaMonkey to version 2.24 or later.
CVE-2014-1480 affects all versions of Mozilla Firefox prior to 27.0.
CVE-2014-1480 impacts all versions of SeaMonkey before version 2.24.
CVE-2014-1480 can facilitate clickjacking attacks, allowing attackers to trigger unintended downloads.