Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2009-06-12T21:07:00
Updated: 2017-09-28T12:57:01
Reserved: 2009-05-29T00:00:00
Link: CVE-2009-1836
JSON object: View
NVD Information
Status : Modified
Published: 2009-06-12T21:30:00.327
Modified: 2018-10-30T16:25:58.530
Link: CVE-2009-1836
JSON object: View
Redhat Information
No data.
CWE