|
|
| |
Credit:
The original article can be found at: http://www.securityfocus.com/bid/51765
The information has been provided by Alex Dvorov.
|
| |
Vulnerable Systems:
* Mozilla Thunderbird 9.0
* Mozilla Thunderbird 8.0
* Mozilla Thunderbird 7.0
* Mozilla Thunderbird 10.0
* Mozilla SeaMonkey 2.7
* Mozilla SeaMonkey 2.6
* Mozilla SeaMonkey 2.5
* Mozilla SeaMonkey 2.4
* Mozilla SeaMonkey 2.3
* Mozilla SeaMonkey 2.2
* Mozilla SeaMonkey 2.2
* Mozilla Firefox 9.0.1
* Mozilla Firefox 9.0
* Mozilla Firefox 8.0.1
* Mozilla Firefox 8.0
* Mozilla Firefox 7.0.1
* Mozilla Firefox 7.0
* Mozilla Firefox 7
* Mozilla Firefox 6.0.2
* Mozilla Firefox 6.0.1
* Mozilla Firefox 6.0
* Mozilla Firefox 6
* Mozilla Firefox 5.0.1
* Mozilla Firefox 5.0
* Mozilla Firefox 10.0
Non-Vulnerable Systems:
* Mozilla Thunderbird 10.0.1
* Mozilla SeaMonkey 2.7.1
* Mozilla Firefox 10.0.1
A remote attacker can exploit this vulnerability to bypass the HTML5 frame navigation policy and launch spoofing or phishing attacks against other sites.
Vendor Status:
Mozilla as issued an update for this vulnerablity
Patch Availability:
http://www.mozilla.org/en-US/products/download.html?product=firefox-12.0&os=win&lang=en-US
CVE Information:
CVE-2012-0445
Disclosure Timeline:
Initial Release Jan 31 2012
|
|
|