![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2012-0475 |
Description: | Mozilla Firefox 4.x through 11.0, Thunderbird 5.0 through 11.0, and SeaMonkey before 2.9 do not properly construct the Origin and Sec- WebSocket-Origin HTTP headers, which might allow remote attackers to bypass an IPv6 literal ACL via a cross-site (1) XMLHttpRequest or (2) WebSocket operation involving a nonstandard port number and an IPv6 address that contains certain zero fields. |
Test IDs: | 1.3.6.1.4.1.25623.1.2.1.2012.28 1.3.6.1.4.1.25623.1.0.802843 1.3.6.1.4.1.25623.1.0.802842 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-0475 BugTraq ID: 53230 http://www.securityfocus.com/bid/53230 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16279 http://secunia.com/advisories/48972 http://secunia.com/advisories/49047 http://secunia.com/advisories/49055 XForce ISS Database: firefox-websocket-sec-bypass(75153) https://exchange.xforce.ibmcloud.com/vulnerabilities/75153 |