[Bug 229253] New: CVE-2007-0981: seamonkey cookie setting / same-domain bypass vulnerability

bugzilla at redhat.com bugzilla at redhat.com
Mon Feb 19 19:24:56 UTC 2007


Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.




https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=229253

           Summary: CVE-2007-0981: seamonkey cookie setting / same-domain
                    bypass vulnerability
           Product: Fedora Extras
           Version: fc6
          Platform: All
        OS/Version: Linux
            Status: NEW
          Severity: medium
          Priority: normal
         Component: seamonkey
        AssignedTo: kengert at redhat.com
        ReportedBy: ville.skytta at iki.fi
         QAContact: extras-qa at fedoraproject.org
                CC: fedora-security-list at redhat.com


http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-0981

"Mozilla based browsers allows remote attackers to bypass the same origin
policy, steal cookies, and conduct other attacks by writing a URI with a null
byte to the hostname (location.hostname) DOM property, due to interactions with
DNS resolver code."

Seamonkey seems vulnerable.  See also
https://bugzilla.mozilla.org/show_bug.cgi?id=370445

-- 
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.




More information about the Fedora-security-list mailing list