4.3
CVSSv2

CVE-2015-0812

Published: 01/04/2015 Updated: 30/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Mozilla Firefox prior to 37.0 does not require an HTTPS session for lightweight theme add-on installations, which allows man-in-the-middle malicious users to bypass an intended user-confirmation requirement by deploying a crafted web site and conducting a DNS spoofing attack against a mozilla.org subdomain.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox 36.0.4

opensuse opensuse 13.1

opensuse opensuse 13.2

canonical ubuntu linux 14.10

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

Vendor Advisories

Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Mozilla Foundation Security Advisory 2015-32 Add-on lightweight theme installation approval bypassed through MITM attack Announced March 31, 2015 Reporter Armin Razmdjou Impact Moderate Products Firefox Fixed in ...
Mozilla Firefox before 370 does not require an HTTPS session for lightweight theme add-on installations, which allows man-in-the-middle attackers to bypass an intended user-confirmation requirement by deploying a crafted web site and conducting a DNS spoofing attack against a mozillaorg subdomain ...