Upstream information
Description
The XPCSafeJSObjectWrapper class in the SafeJSObjectWrapper (aka SJOW) implementation in Mozilla Firefox before 3.5.12, Thunderbird before 3.0.7, and SeaMonkey before 2.0.7 does not properly restrict scripted functions, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted function.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 4.3 |
Vector | AV:N/AC:M/Au:N/C:N/I:P/A:N |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | Partial |
Availability Impact | None |
- SUSE-SA:2010:049, published Tue, 12 Oct 2010 13:00:00 +0000
- SUSE-SA:2010:056, published Mon, 08 Nov 2010 09:00:00 +0000
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
SUSE Linux Enterprise Server 11 SP1 |
| Patchnames: slessp1-MozillaFirefox |
SUSE Linux Enterprise Server 11 |
| Patchnames: slessp0-MozillaFirefox |
SUSE Linux Enterprise Server for SAP Applications 11 |
| Patchnames: slessp0-MozillaFirefox |
openSUSE Tumbleweed |
| Patchnames: openSUSE Tumbleweed GA seamonkey-2.40-6.1 |