First published: Wed Apr 01 2015(Updated: )
Mozilla Firefox before 37.0 does not require an HTTPS session for lightweight theme add-on installations, which allows man-in-the-middle attackers to bypass an intended user-confirmation requirement by deploying a crafted web site and conducting a DNS spoofing attack against a mozilla.org subdomain.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | =36.0.4 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =14.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0812 is classified as a medium-severity vulnerability.
To fix CVE-2015-0812, update Mozilla Firefox to version 37.0 or later.
CVE-2015-0812 allows man-in-the-middle attackers to bypass user confirmation for theme installations.
Firefox versions before 37.0, including 36.0.4, are affected by CVE-2015-0812.
CVE-2015-0812 can be exploited through a crafted website combined with DNS spoofing attacks against mozilla.org subdomains.