MEDIUM · 4.3

CVE-2012-4201

The evalInSandbox implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 uses an incorr...

Vulnerability Description

The evalInSandbox implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 uses an incorrect context during the handling of JavaScript code that sets the location.href property, which allows remote attackers to conduct cross-site scripting (XSS) attacks or read arbitrary files by leveraging a sandboxed add-on.

CVSS Score

4.3

MEDIUM

AV:N/AC:M/Au:N/C:N/I:P/A:N
Confidentiality
NONE
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
MozillaFirefox< 17.0
MozillaSeamonkey< 2.14
MozillaThunderbird< 17.0
MozillaThunderbird Esr>= 10.0, < 10.0.11
OpensuseOpensuse11.4
SuseLinux Enterprise Desktop10
SuseLinux Enterprise Server10
SuseLinux Enterprise Software Development Kit10
RedhatEnterprise Linux Desktop5.0
RedhatEnterprise Linux Eus6.3
RedhatEnterprise Linux Server5.0
RedhatEnterprise Linux Workstation5.0
CanonicalUbuntu Linux10.04
DebianDebian Linux6.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2012-4201?

CVE-2012-4201 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The evalInSandbox implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 uses an incorr...

How severe is CVE-2012-4201?

CVE-2012-4201 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2012-4201?

Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Mozilla Seamonkey, Mozilla Thunderbird, Mozilla Thunderbird Esr, Opensuse Opensuse.