First published: Sun Jan 31 2016(Updated: )
Mozilla Firefox before 44.0 allows user-assisted remote attackers to spoof a trailing substring in the address bar by leveraging a user's paste of a (1) wyciwyg: URI or (2) resource: URI.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE | =42.1 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
Mozilla Firefox | <=43.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1942 is classified as a moderate severity vulnerability due to its potential for exploitation through user assistance.
To fix CVE-2016-1942, update Mozilla Firefox to version 44.0 or later.
CVE-2016-1942 affects Mozilla Firefox versions prior to 44.0 and specific versions of openSUSE.
CVE-2016-1942 exploits wyciwyg: and resource: URIs to spoof addresses in the Firefox browser.
No official workaround is provided for CVE-2016-1942, so applying the update is the recommended mitigation.