CRLF injection vulnerability in the nsCookieService::SetCookieStringInternal function in netwerk/cookie/nsCookieService.cpp in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allows remote attackers to bypass intended access restrictions via a string containing a \n (newline) character, which is not properly handled in a JavaScript "document.cookie =" expression, a different vulnerability than CVE-2011-2374.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=643051 | patch |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14401 | vdb entry signature |
http://www.redhat.com/support/errata/RHSA-2011-0887.html | vendor advisory |
http://www.redhat.com/support/errata/RHSA-2011-0885.html | vendor advisory |
http://www.mozilla.org/security/announce/2011/mfsa2011-19.html | vendor advisory |
http://www.redhat.com/support/errata/RHSA-2011-0888.html | vendor advisory |
http://www.redhat.com/support/errata/RHSA-2011-0886.html | vendor advisory |