4.3
CVSSv2

CVE-2012-3976

Published: 29/08/2012 Updated: 26/08/2020
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Mozilla Firefox prior to 15.0, Firefox ESR 10.x prior to 10.0.7, and SeaMonkey prior to 2.12 do not properly handle onLocationChange events during navigation between different https sites, which allows remote malicious users to spoof the X.509 certificate information in the address bar via a crafted web page.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox

mozilla firefox esr

mozilla seamonkey

opensuse opensuse 12.2

suse linux enterprise desktop 10

suse linux enterprise desktop 11

suse linux enterprise server 10

suse linux enterprise server 11

suse linux enterprise software development kit 11

redhat enterprise linux desktop 5.0

redhat enterprise linux desktop 6.0

redhat enterprise linux eus 6.3

redhat enterprise linux server 5.0

redhat enterprise linux server 6.0

redhat enterprise linux server eus 6.3

redhat enterprise linux workstation 5.0

redhat enterprise linux workstation 6.0

canonical ubuntu linux 10.04

canonical ubuntu linux 11.04

canonical ubuntu linux 11.10

canonical ubuntu linux 12.04

Vendor Advisories

Synopsis Critical: firefox security update Type/Severity Security Advisory: Critical Topic Updated firefox packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 5 and 6The Red Hat Security Response Team has rated this update as having criticalsecurity impact Common Vulne ...
USN-1548-1 introduced a regression in Firefox ...
Multiple security issues were fixed in Firefox ...
Mozilla Foundation Security Advisory 2012-69 Incorrect site SSL certificate data display Announced August 28, 2012 Reporter Mark Poticha Impact High Products Firefox, Firefox ESR, SeaMonkey Fixed in ...