Upstream information
Description
Mozilla Firefox before 41.0 on Android allows user-assisted remote attackers to spoof address-bar attributes by leveraging lack of navigation after a paste of a URL with a nonstandard scheme, as demonstrated by spoofing an SSL attribute.SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 4.3 |
Vector | AV:N/AC:M/Au:N/C:N/I:P/A:N |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | Partial |
Availability Impact | None |
- openSUSE-SU-2015:1658-1, published Thu, 1 Oct 2015 10:09:18 +0200 (CEST)
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
SUSE Linux Enterprise Module for Desktop Applications 15 SP1 |
| |
SUSE Linux Enterprise Module for Desktop Applications 15 SP2 |
| |
SUSE Linux Enterprise Module for Desktop Applications 15 |
| |
openSUSE 13.1 |
| Patchnames: openSUSE-2015-619 |
openSUSE Leap 15.0 |
| Patchnames: openSUSE Leap 15.0 GA MozillaFirefox |
openSUSE Leap 42.1 |
| Patchnames: openSUSE Leap 42.1 GA MozillaFirefox |
openSUSE Leap 42.2 |
| Patchnames: openSUSE Leap 42.2 GA MozillaFirefox |
openSUSE Leap 42.3 |
| Patchnames: openSUSE Leap 42.3 GA MozillaFirefox |
openSUSE Tumbleweed |
| Patchnames: openSUSE Tumbleweed GA MozillaFirefox |