Mozilla Firefox before 22.0 does not properly enforce the X-Frame-Options protection mechanism, which allows remote attackers to conduct clickjacking attacks via a crafted web site that uses the HTTP server push feature with multipart responses.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.ubuntu.com/usn/USN-1890-1 | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=761667 | |
http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html | vendor advisory |
http://www.mozilla.org/security/announce/2013/mfsa2013-58.html | vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16992 | vdb entry signature |