You are here

CVE-2013-0795

Vincent (CVE) Danen's picture
The System Only Wrapper (SOW) implementation in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 does not prevent use of the cloneNode method for cloning a protected node, which allows remote attackers to bypass the Same Origin Policy or possibly execute arbitrary JavaScript code with chrome privileges via a crafted web site.

Details Source

Mitre

Public Date

2013-04-02 00:00:00

Impact

Critical

Bugzilla

CVE-2013-0795 Mozilla: Bypass of SOW protections allows cloning of protected nodes (MFSA 2013-36)

Bugzilla ID

946 932

CVSS Status

verified

Base Score

6.80

Base Metrics

AV:N/AC:M/Au:N/C:P/I:P/A:P

Acknowledgements

Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Cody Crews as the original reporter.

External References

http://www.mozilla.org/security/announce/2013/mfsa2013-36.html

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server) (thunderbird) RHSA-2013:0697 2013-04-02
Red Hat Enterprise Linux 6 (thunderbird) RHSA-2013:0697 2013-04-02
Red Hat Enterprise Linux 6 (firefox) RHSA-2013:0696 2013-04-02
Red Hat Enterprise Linux 5 (firefox) RHSA-2013:0696 2013-04-02
Red Hat Enterprise Linux 5 (thunderbird) RHSA-2013:0697 2013-04-02

Affected Packages State

Platform Package State
Red Hat Enterprise Linux version 6 xulrunner 17.0.5-1.el6_4 Fixed
Red Hat Enterprise Linux version 5 xulrunner 17.0.5-1.el5_9 Fixed