CVE-2015-0812
01.04.2015, 10:59
Mozilla Firefox before 37.0 does not require an HTTPS session for lightweight theme add-on installations, which allows man-in-the-middle attackers to bypass an intended user-confirmation requirement by deploying a crafted web site and conducting a DNS spoofing attack against a mozilla.org subdomain.Enginsight
| Vendor | Product | Version |
|---|---|---|
| mozilla | firefox | 36.0.4 |
| opensuse | opensuse | 13.1 |
| opensuse | opensuse | 13.2 |
| canonical | ubuntu_linux | 12.04 |
| canonical | ubuntu_linux | 14.04 |
| canonical | ubuntu_linux | 14.10 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Common Weakness Enumeration
References