Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict setting the home page through the dragging of a URL to the home button, which allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a javascript: URL that is later interpreted in the about:sessionrestore context.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00015.html
http://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-0387.html
http://rhn.redhat.com/errata/RHSA-2012-0388.html
http://secunia.com/advisories/48359
http://secunia.com/advisories/48402
http://secunia.com/advisories/48414
http://secunia.com/advisories/48495 Third Party Advisory
http://secunia.com/advisories/48496 Third Party Advisory
http://secunia.com/advisories/48513 Third Party Advisory
http://secunia.com/advisories/48553 Third Party Advisory
http://secunia.com/advisories/48561 Third Party Advisory
http://secunia.com/advisories/48624 Third Party Advisory
http://secunia.com/advisories/48629 Third Party Advisory
http://secunia.com/advisories/48823 Third Party Advisory
http://secunia.com/advisories/48920 Third Party Advisory
http://www.debian.org/security/2012/dsa-2433 Third Party Advisory
http://www.debian.org/security/2012/dsa-2458
http://www.mandriva.com/security/advisories?name=MDVSA-2012:031
http://www.mandriva.com/security/advisories?name=MDVSA-2012:032
http://www.mozilla.org/security/announce/2012/mfsa2012-16.html Vendor Advisory
http://www.securityfocus.com/bid/52460
http://www.securitytracker.com/id?1026801
http://www.securitytracker.com/id?1026803
http://www.securitytracker.com/id?1026804
http://www.ubuntu.com/usn/USN-1400-1
http://www.ubuntu.com/usn/USN-1400-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-1400-3 Third Party Advisory
http://www.ubuntu.com/usn/USN-1400-4 Third Party Advisory
http://www.ubuntu.com/usn/USN-1400-5 Third Party Advisory
http://www.ubuntu.com/usn/USN-1401-1 Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=718203 Exploit Issue Tracking Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=719994 Issue Tracking Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=723808 Patch Issue Tracking Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15122 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2012-03-14T19:00:00

Updated: 2018-01-17T19:57:01

Reserved: 2012-01-09T00:00:00


Link: CVE-2012-0458

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2012-03-14T19:55:02.037

Modified: 2018-01-18T02:29:04.770


Link: CVE-2012-0458

JSON object: View

cve-icon Redhat Information

No data.

CWE