CVE-2012-3992

Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly manage history data, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive POST content via vectors involving a location.hash write operation and history navigation that triggers the loading of a URL into the history object.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-1351.html Third Party Advisory
http://secunia.com/advisories/50856 Third Party Advisory
http://secunia.com/advisories/50892 Third Party Advisory
http://secunia.com/advisories/50904 Third Party Advisory
http://secunia.com/advisories/50935 Third Party Advisory
http://secunia.com/advisories/50936 Third Party Advisory
http://secunia.com/advisories/50984 Third Party Advisory
http://secunia.com/advisories/55318 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2012:163 Third Party Advisory
http://www.mozilla.org/security/announce/2012/mfsa2012-84.html Vendor Advisory
http://www.securityfocus.com/bid/56128 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-1611-1 Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=775009 Issue Tracking Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16987 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-1351.html Third Party Advisory
http://secunia.com/advisories/50856 Third Party Advisory
http://secunia.com/advisories/50892 Third Party Advisory
http://secunia.com/advisories/50904 Third Party Advisory
http://secunia.com/advisories/50935 Third Party Advisory
http://secunia.com/advisories/50936 Third Party Advisory
http://secunia.com/advisories/50984 Third Party Advisory
http://secunia.com/advisories/55318 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2012:163 Third Party Advisory
http://www.mozilla.org/security/announce/2012/mfsa2012-84.html Vendor Advisory
http://www.securityfocus.com/bid/56128 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-1611-1 Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=775009 Issue Tracking Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16987 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

Configuration 7 (hide)

OR cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_sdk:10:sp4:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*

History

No history.

Information

Published : 2012-10-10 17:55

Updated : 2025-04-11 00:51


NVD link : CVE-2012-3992

Mitre link : CVE-2012-3992

CVE.ORG link : CVE-2012-3992


JSON object : View

Products Affected

redhat

  • enterprise_linux_workstation
  • enterprise_linux_desktop
  • enterprise_linux_eus
  • enterprise_linux_server

mozilla

  • thunderbird_esr
  • thunderbird
  • firefox
  • seamonkey

suse

  • linux_enterprise_desktop
  • linux_enterprise_server
  • linux_enterprise_sdk

canonical

  • ubuntu_linux
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')