Upstream information
CVE-2009-1836 at MITRE
Description
Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
CVSS v2 Scores
| National Vulnerability Database |
Base Score | 6.8 |
Vector | AV:N/AC:M/Au:N/C:P/I:P/A:P |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | Partial |
SUSE Bugzilla entries:
505563 [RESOLVED / FIXED],
514733 [RESOLVED / UPSTREAM],
515951 [RESOLVED / FIXED]
SUSE Security Advisories:
List of released packages
Product(s) | Fixed package version(s) | References |
SUSE Linux Enterprise Server 11 SP1 | mozilla-xulrunner190 >= 1.9.0.19-0.1.1
mozilla-xulrunner190-32bit >= 1.9.0.19-0.1.1
mozilla-xulrunner190-gnomevfs >= 1.9.0.19-0.1.1
mozilla-xulrunner190-translations >= 1.9.0.19-0.1.1
mozilla-xulrunner190-x86 >= 1.9.0.19-0.1.1
| Patchnames: SUSE Linux Enterprise Server 11 SP1 GA mozilla-xulrunner190-1.9.0.19-0.1.1 |
SUSE Linux Enterprise Server 11
SUSE Linux Enterprise Server for SAP Applications 11 | MozillaFirefox >= 3.0.11-0.1.1
MozillaFirefox-branding-SLED >= 3.5-1.1.5
MozillaFirefox-translations >= 3.0.11-0.1.1
gconf2 >= 2.24.0-7.5
gconf2-32bit >= 2.24.0-7.5
gconf2-x86 >= 2.24.0-7.5
libfreebl3 >= 3.12.3.1-1.2.1
libfreebl3-32bit >= 3.12.3.1-1.2.1
libfreebl3-x86 >= 3.12.3.1-1.2.1
libidl >= 0.8.11-2.14
libidl-32bit >= 0.8.11-2.14
libidl-x86 >= 0.8.11-2.14
mozilla-nspr >= 4.8-1.3.1
mozilla-nspr-32bit >= 4.8-1.3.1
mozilla-nspr-x86 >= 4.8-1.3.1
mozilla-nss >= 3.12.3.1-1.2.1
mozilla-nss-32bit >= 3.12.3.1-1.2.1
mozilla-nss-tools >= 3.12.3.1-1.2.1
mozilla-nss-x86 >= 3.12.3.1-1.2.1
mozilla-xulrunner190 >= 1.9.0.11-1.1.1
mozilla-xulrunner190-32bit >= 1.9.0.11-1.1.1
mozilla-xulrunner190-gnomevfs >= 1.9.0.11-1.1.1
mozilla-xulrunner190-translations >= 1.9.0.11-1.1.1
mozilla-xulrunner190-x86 >= 1.9.0.11-1.1.1
mozilla-xulrunner191 >= 1.9.1.11-0.1.1
mozilla-xulrunner191-32bit >= 1.9.1.11-0.1.1
mozilla-xulrunner191-gnomevfs >= 1.9.1.11-0.1.1
mozilla-xulrunner191-translations >= 1.9.1.11-0.1.1
mozilla-xulrunner191-x86 >= 1.9.1.11-0.1.1
mozilla-xulrunner192 >= 1.9.2.12-0.6.1
mozilla-xulrunner192-32bit >= 1.9.2.12-0.6.1
mozilla-xulrunner192-gnome >= 1.9.2.12-0.6.1
mozilla-xulrunner192-translations >= 1.9.2.12-0.6.1
mozilla-xulrunner192-x86 >= 1.9.2.12-0.6.1
orbit2 >= 2.14.16-2.16
orbit2-32bit >= 2.14.16-2.16
orbit2-x86 >= 2.14.16-2.16
| Patchnames: slessp0-MozillaFirefox |
SUSE Timeline for this CVE
CVE page created: Tue Jul 9 16:38:15 2013
CVE page last modified: Sat Jun 15 20:56:30 2024