Computer Security
[EN] no-pyccku

Related information

  Mozilla Firefox / Seamonkey / Thunderbird multiple security vulnerabilities

  ZDI-09-015: Mozilla Firefox XUL _moveToEdgeShift(
) Memory Corruption Vulnerability

  Mozilla Foundation Security Advisory 2009-12

  Mozilla Foundation Security Advisory 2009-13

  Mozilla Foundation Security Advisory 2009-11

Subject:Mozilla Foundation Security Advisory 2009-09

Mozilla Foundation Security Advisory 2009-09

Title: XML data theft via RDFXMLDataSource and cross-domain redirect
Impact: High
Announced: March 4, 2009
Reporter: Georgi Guninski
Products: Firefox, Thunderbird, SeaMonkey

Fixed in: Firefox 3.0.7
 SeaMonkey 1.1.15

Mozilla security researcher Georgi Guninski reported that a website could use nsIRDFService and a cross-domain redirect to steal arbitrary XML data from another domain, a violation of the same-origin policy. This vulnerability could be used by a malicious website to steal private data from users authenticated to the redirected website.

Thunderbird shares the browser engine with Firefox and could be vulnerable if JavaScript were to be enabled in mail. This is not the default setting and we strongly discourage users from running JavaScript in mail.

Disable JavaScript until a version containing these fixes can be installed.

   * CVE-2009-0776

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod