First published: Wed Apr 01 2015(Updated: )
Mozilla Firefox before 37.0 relies on docshell type information instead of page principal information for Window.webidl access control, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via certain content navigation that leverages the reachability of a privileged window with an unintended persistence of access to restricted internal methods.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE | =13.1 | |
openSUSE | =13.2 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =14.10 | |
Mozilla Firefox | <=36.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0802 has a high severity rating due to its potential to allow remote attackers to execute arbitrary JavaScript code with chrome privileges.
To fix CVE-2015-0802, update Mozilla Firefox to version 37.0 or later.
CVE-2015-0802 affects Mozilla Firefox versions prior to 37.0.
CVE-2015-0802 impacts users of specific versions of openSUSE and Ubuntu Linux.
The risks of CVE-2015-0802 include the possibility of unauthorized execution of JavaScript, compromising user data and privacy.