Mozilla Firefox before 37.0 does not require an HTTPS session for lightweight theme add-on installations, which allows man-in-the-middle attackers to bypass an intended user-confirmation requirement by deploying a crafted web site and conducting a DNS spoofing attack against a mozilla.org subdomain.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2015-04-01 10:59
Updated : 2024-02-04 18:35
NVD link : CVE-2015-0812
Mitre link : CVE-2015-0812
CVE.ORG link : CVE-2015-0812
JSON object : View
Products Affected
mozilla
- firefox
canonical
- ubuntu_linux
opensuse
- opensuse
CWE
CWE-17
DEPRECATED: Code