Mozilla Firefox before 3.6.20, Thunderbird 2.x and 3.x before 3.1.12, SeaMonkey 1.x and 2.x, and possibly other products does not properly handle the RegExp.input property, which allows remote attackers to bypass the Same Origin Policy and read data from a different domain via a crafted web site, possibly related to a use-after-free.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.mandriva.com/security/advisories?name=MDVSA-2011:127 | vendor advisory |
http://www.mozilla.org/security/announce/2011/mfsa2011-30.html | vendor advisory |
http://www.debian.org/security/2011/dsa-2297 | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00027.html | vendor advisory |
http://www.debian.org/security/2011/dsa-2296 | vendor advisory |
http://www.securitytracker.com/id?1025940 | vdb entry |
http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html | vendor advisory |
http://www.redhat.com/support/errata/RHSA-2011-1164.html | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=626297 | |
http://www.redhat.com/support/errata/RHSA-2011-1165.html | vendor advisory |
http://www.debian.org/security/2011/dsa-2295 | vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14272 | signature vdb entry |
http://www.redhat.com/support/errata/RHSA-2011-1167.html | vendor advisory |