CVE-2015-0812

Mozilla Firefox before 37.0 does not require an HTTPS session for lightweight theme add-on installations, which allows man-in-the-middle attackers to bypass an intended user-confirmation requirement by deploying a crafted web site and conducting a DNS spoofing attack against a mozilla.org subdomain.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:firefox:36.0.4:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*

History

No history.

Information

Published : 2015-04-01 10:59

Updated : 2024-02-04 18:35


NVD link : CVE-2015-0812

Mitre link : CVE-2015-0812

CVE.ORG link : CVE-2015-0812


JSON object : View

Products Affected

mozilla

  • firefox

canonical

  • ubuntu_linux

opensuse

  • opensuse
CWE
CWE-17

DEPRECATED: Code