Vulnerability Description
Mozilla Firefox before 37.0 does not require an HTTPS session for lightweight theme add-on installations, which allows man-in-the-middle attackers to bypass an intended user-confirmation requirement by deploying a crafted web site and conducting a DNS spoofing attack against a mozilla.org subdomain.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | 36.0.4 |
| Opensuse | Opensuse | 13.1 |
| Canonical | Ubuntu Linux | 12.04 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-32.htmlVendor Advisory
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securitytracker.com/id/1031996
- http://www.ubuntu.com/usn/USN-2550-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1128126
- https://security.gentoo.org/glsa/201512-10
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-32.htmlVendor Advisory
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securitytracker.com/id/1031996
- http://www.ubuntu.com/usn/USN-2550-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1128126
- https://security.gentoo.org/glsa/201512-10
FAQ
What is CVE-2015-0812?
CVE-2015-0812 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Mozilla Firefox before 37.0 does not require an HTTPS session for lightweight theme add-on installations, which allows man-in-the-middle attackers to bypass an intended user-confirmation requirement b...
How severe is CVE-2015-0812?
CVE-2015-0812 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-0812?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Opensuse Opensuse, Canonical Ubuntu Linux.