CVE-2009-2472

Mozilla Firefox before 3.0.12 does not always use XPCCrossOriginWrapper when required during object construction, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted document, related to a "cross origin wrapper bypass."
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2009-1162.html Broken Link
http://secunia.com/advisories/35914 Third Party Advisory
http://secunia.com/advisories/35944 Third Party Advisory
http://secunia.com/advisories/36005 Third Party Advisory
http://secunia.com/advisories/36145 Third Party Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-265068-1 Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020800.1-1 Broken Link
http://www.mozilla.org/security/announce/2009/mfsa2009-40.html Patch Vendor Advisory
http://www.securityfocus.com/bid/35758 Patch Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2009/1972 Patch Third Party Advisory
http://www.vupen.com/english/advisories/2009/2152 Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=479288 Issue Tracking Patch Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=481434 Issue Tracking Patch Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=497102 Issue Tracking Patch Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9497 Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01032.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2009-1162.html Broken Link
http://secunia.com/advisories/35914 Third Party Advisory
http://secunia.com/advisories/35944 Third Party Advisory
http://secunia.com/advisories/36005 Third Party Advisory
http://secunia.com/advisories/36145 Third Party Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-265068-1 Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020800.1-1 Broken Link
http://www.mozilla.org/security/announce/2009/mfsa2009-40.html Patch Vendor Advisory
http://www.securityfocus.com/bid/35758 Patch Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2009/1972 Patch Third Party Advisory
http://www.vupen.com/english/advisories/2009/2152 Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=479288 Issue Tracking Patch Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=481434 Issue Tracking Patch Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=497102 Issue Tracking Patch Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9497 Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01032.html Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*
cpe:2.3:a:suse:linux_enterprise_debuginfo:11:-:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*

History

21 Nov 2024, 01:04

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html - Mailing List, Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2009-1162.html - Broken Link () http://rhn.redhat.com/errata/RHSA-2009-1162.html - Broken Link
References () http://secunia.com/advisories/35914 - Third Party Advisory () http://secunia.com/advisories/35914 - Third Party Advisory
References () http://secunia.com/advisories/35944 - Third Party Advisory () http://secunia.com/advisories/35944 - Third Party Advisory
References () http://secunia.com/advisories/36005 - Third Party Advisory () http://secunia.com/advisories/36005 - Third Party Advisory
References () http://secunia.com/advisories/36145 - Third Party Advisory () http://secunia.com/advisories/36145 - Third Party Advisory
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-265068-1 - Broken Link () http://sunsolve.sun.com/search/document.do?assetkey=1-26-265068-1 - Broken Link
References () http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020800.1-1 - Broken Link () http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020800.1-1 - Broken Link
References () http://www.mozilla.org/security/announce/2009/mfsa2009-40.html - Patch, Vendor Advisory () http://www.mozilla.org/security/announce/2009/mfsa2009-40.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/35758 - Patch, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/35758 - Patch, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2009/1972 - Patch, Third Party Advisory () http://www.vupen.com/english/advisories/2009/1972 - Patch, Third Party Advisory
References () http://www.vupen.com/english/advisories/2009/2152 - Third Party Advisory () http://www.vupen.com/english/advisories/2009/2152 - Third Party Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=479288 - Issue Tracking, Patch, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=479288 - Issue Tracking, Patch, Vendor Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=481434 - Issue Tracking, Patch, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=481434 - Issue Tracking, Patch, Vendor Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=497102 - Issue Tracking, Patch, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=497102 - Issue Tracking, Patch, Vendor Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9497 - Third Party Advisory () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9497 - Third Party Advisory
References () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01032.html - Third Party Advisory () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01032.html - Third Party Advisory

29 Jul 2021, 13:46

Type Values Removed Values Added
CPE cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0:beta1:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.21:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.6:*:linux:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9_rc:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*
cpe:2.3:a:suse:linux_enterprise_debuginfo:11:-:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*
References (SECUNIA) http://secunia.com/advisories/36145 - (SECUNIA) http://secunia.com/advisories/36145 - Third Party Advisory
References (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-26-265068-1 - (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-26-265068-1 - Broken Link
References (BID) http://www.securityfocus.com/bid/35758 - Patch (BID) http://www.securityfocus.com/bid/35758 - Patch, Third Party Advisory, VDB Entry
References (CONFIRM) https://bugzilla.mozilla.org/show_bug.cgi?id=497102 - (CONFIRM) https://bugzilla.mozilla.org/show_bug.cgi?id=497102 - Issue Tracking, Patch, Vendor Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2009/1972 - Patch, Vendor Advisory (VUPEN) http://www.vupen.com/english/advisories/2009/1972 - Patch, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html - Mailing List, Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2009/2152 - (VUPEN) http://www.vupen.com/english/advisories/2009/2152 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/36005 - (SECUNIA) http://secunia.com/advisories/36005 - Third Party Advisory
References (CONFIRM) https://bugzilla.mozilla.org/show_bug.cgi?id=479288 - (CONFIRM) https://bugzilla.mozilla.org/show_bug.cgi?id=479288 - Issue Tracking, Patch, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/35914 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/35914 - Third Party Advisory
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9497 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9497 - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html - Mailing List, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/35944 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/35944 - Third Party Advisory
References (CONFIRM) https://bugzilla.mozilla.org/show_bug.cgi?id=481434 - (CONFIRM) https://bugzilla.mozilla.org/show_bug.cgi?id=481434 - Issue Tracking, Patch, Vendor Advisory
References (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01032.html - (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01032.html - Third Party Advisory
References (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020800.1-1 - (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020800.1-1 - Broken Link
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2009-1162.html - (REDHAT) http://rhn.redhat.com/errata/RHSA-2009-1162.html - Broken Link

Information

Published : 2009-07-22 18:30

Updated : 2024-11-21 01:04


NVD link : CVE-2009-2472

Mitre link : CVE-2009-2472

CVE.ORG link : CVE-2009-2472


JSON object : View

Products Affected

suse

  • linux_enterprise_debuginfo
  • linux_enterprise_server
  • linux_enterprise_desktop

opensuse

  • opensuse

mozilla

  • firefox

fedoraproject

  • fedora
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')