Mozilla Firefox before 3.0.12 does not always use XPCCrossOriginWrapper when required during object construction, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted document, related to a "cross origin wrapper bypass."
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 01:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html - Mailing List, Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2009-1162.html - Broken Link | |
References | () http://secunia.com/advisories/35914 - Third Party Advisory | |
References | () http://secunia.com/advisories/35944 - Third Party Advisory | |
References | () http://secunia.com/advisories/36005 - Third Party Advisory | |
References | () http://secunia.com/advisories/36145 - Third Party Advisory | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-265068-1 - Broken Link | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020800.1-1 - Broken Link | |
References | () http://www.mozilla.org/security/announce/2009/mfsa2009-40.html - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/35758 - Patch, Third Party Advisory, VDB Entry | |
References | () http://www.vupen.com/english/advisories/2009/1972 - Patch, Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2009/2152 - Third Party Advisory | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=479288 - Issue Tracking, Patch, Vendor Advisory | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=481434 - Issue Tracking, Patch, Vendor Advisory | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=497102 - Issue Tracking, Patch, Vendor Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9497 - Third Party Advisory | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01032.html - Third Party Advisory |
29 Jul 2021, 13:46
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0:beta1:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0.0.21:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.0.6:*:linux:*:*:*:*:* cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:0.9_rc:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:* |
cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:-:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:* |
References | (SECUNIA) http://secunia.com/advisories/36145 - Third Party Advisory | |
References | (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-26-265068-1 - Broken Link | |
References | (BID) http://www.securityfocus.com/bid/35758 - Patch, Third Party Advisory, VDB Entry | |
References | (CONFIRM) https://bugzilla.mozilla.org/show_bug.cgi?id=497102 - Issue Tracking, Patch, Vendor Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2009/1972 - Patch, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html - Mailing List, Third Party Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2009/2152 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/36005 - Third Party Advisory | |
References | (CONFIRM) https://bugzilla.mozilla.org/show_bug.cgi?id=479288 - Issue Tracking, Patch, Vendor Advisory | |
References | (SECUNIA) http://secunia.com/advisories/35914 - Third Party Advisory | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9497 - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html - Mailing List, Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/35944 - Third Party Advisory | |
References | (CONFIRM) https://bugzilla.mozilla.org/show_bug.cgi?id=481434 - Issue Tracking, Patch, Vendor Advisory | |
References | (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01032.html - Third Party Advisory | |
References | (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020800.1-1 - Broken Link | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2009-1162.html - Broken Link |
Information
Published : 2009-07-22 18:30
Updated : 2024-11-21 01:04
NVD link : CVE-2009-2472
Mitre link : CVE-2009-2472
CVE.ORG link : CVE-2009-2472
JSON object : View
Products Affected
suse
- linux_enterprise_debuginfo
- linux_enterprise_server
- linux_enterprise_desktop
opensuse
- opensuse
mozilla
- firefox
fedoraproject
- fedora
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')