Vulnerabilities > CVE-2012-5354 - Unspecified vulnerability in Mozilla Firefox, Seamonkey and Thunderbird

047910
CVSS 6.8 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
mozilla
nessus

Summary

Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly handle navigation away from a web page that has multiple menus of SELECT elements active, which allows remote attackers to conduct clickjacking attacks via vectors involving an XPI file, the window.open method, and the Geolocation API, a different vulnerability than CVE-2012-3984.

Vulnerable Configurations

Part Description Count
Application
Mozilla
529

Nessus

  • NASL familyWindows
    NASL idMOZILLA_FIREFOX_160.NASL
    descriptionThe installed version of Firefox is earlier than 16.0 and thus, is affected by the following vulnerabilities : - Several memory safety bugs exist in the browser engine used in Mozilla-based products that could be exploited to execute arbitrary code. (CVE-2012-3983) -
    last seen2020-06-01
    modified2020-06-02
    plugin id62580
    published2012-10-17
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/62580
    titleFirefox < 16.0 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(62580);
      script_version("1.21");
      script_cvs_date("Date: 2019/12/04");
    
      script_cve_id(
        "CVE-2012-3982",
        "CVE-2012-3983",
        "CVE-2012-3984",
        "CVE-2012-3985",
        "CVE-2012-3986",
        "CVE-2012-3988",
        "CVE-2012-3989",
        "CVE-2012-3990",
        "CVE-2012-3991",
        "CVE-2012-3992",
        "CVE-2012-3993",
        "CVE-2012-3994",
        "CVE-2012-3995",
        "CVE-2012-4179",
        "CVE-2012-4180",
        "CVE-2012-4181",
        "CVE-2012-4182",
        "CVE-2012-4183",
        "CVE-2012-4184",
        "CVE-2012-4185",
        "CVE-2012-4186",
        "CVE-2012-4187",
        "CVE-2012-4188",
        "CVE-2012-5354"
      );
      script_bugtraq_id(
        55922,
        55924,
        55926,
        55927,
        55930,
        55931,
        55932,
        56118,
        56119,
        56120,
        56121,
        56123,
        56125,
        56126,
        56127,
        56128,
        56129,
        56130,
        56131,
        56135,
        56136,
        56140,
        56145,
        57181
      );
    
      script_name(english:"Firefox < 16.0 Multiple Vulnerabilities");
      script_summary(english:"Checks version of Firefox");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Windows host contains a web browser that is affected by
    multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The installed version of Firefox is earlier than 16.0 and thus, is
    affected by the following vulnerabilities :
    
      - Several memory safety bugs exist in the browser engine 
        used in Mozilla-based products that could be exploited 
        to execute arbitrary code. (CVE-2012-3983)
    
      - '<select>' elements can be abused to cover arbitrary 
        portions of a newly loaded page and may also be utilized 
        for click-jacking attacks. (CVE-2012-3984,
        CVE-2012-5354)
    
      - A violation in the HTML specification for 
        'document.domain' behavior can be abused, potentially 
        leading to cross-site scripting attacks. (CVE-2012-3985)
    
      - Some methods of a feature used for testing 
        (DOMWindowUtils) are not properly protected and may be 
        called through script by web pages. (CVE-2012-3986)
    
      - A potentially exploitable denial of service may be 
        caused by a combination of invoking full-screen mode and 
        navigating backwards in history. (CVE-2012-3988)
    
      - A potentially exploitable crash can be caused when 
        making an invalid cast using the 'instanceof' operator 
        on certain types of JavaScript objects. (CVE-2012-3989)
    
      - When the 'GetProperty' function is invoked through JSAP, 
        security checking can by bypassed when getting cross-
        origin properties, potentially allowing arbitrary code 
        execution. (CVE-2012-3991)
    
      - The 'location' property can be accessed by binary 
        plugins through 'top.location' and 'top' can be shadowed 
        by 'Object.defineProperty', potentially allowing cross-
        site scripting attacks through plugins. (CVE-2012-3994)
    
      - The Chrome Object Wrapper (COW) has flaws that could 
        allow access to privileged functions, allowing for cross-
        site scripting attacks or arbitrary code execution. 
        (CVE-2012-3993, CVE-2012-4184)
    
      - The 'location.hash' property is vulnerable to an attack 
        that could allow an attacker to inject script or 
        intercept post data. (CVE-2012-3992)
    
      - The 'Address Sanitizer' tool is affected by multiple, 
        potentially exploitable use-after-free flaws. 
        (CVE-2012-3990, CVE-2012-3995, CVE-2012-4179, 
        CVE-2012-4180, CVE-2012-4181, CVE-2012-4182, 
        CVE-2012-4183)
    
      - The 'Address Sanitizer' tool is affected by multiple, 
        potentially exploitable heap memory corruption issues. 
        (CVE-2012-4185, CVE-2012-4186, CVE-2012-4187, 
        CVE-2012-4188)");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-87/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-86/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-85/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-84/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-83/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-82/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-81/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-80/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-79/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-77/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-76/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-75/");
      script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-74/");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Firefox 16.0 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2012-4188");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
      script_set_attribute(attribute:"metasploit_name", value:'Firefox 5.0 - 15.0.1 __exposedProps__ XCS Code Execution');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
      script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/10/09");
      script_set_attribute(attribute:"patch_publication_date", value:"2012/10/09");
      script_set_attribute(attribute:"plugin_publication_date", value:"2012/10/17");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:firefox");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("mozilla_org_installed.nasl");
      script_require_keys("Mozilla/Firefox/Version");
    
      exit(0);
    }
    
    include("mozilla_version.inc");
    port = get_kb_item_or_exit("SMB/transport"); 
    
    installs = get_kb_list("SMB/Mozilla/Firefox/*");
    if (isnull(installs)) audit(AUDIT_NOT_INST, "Firefox");
    
    mozilla_check_version(installs:installs, product:'firefox', esr:FALSE, fix:'16.0', severity:SECURITY_HOLE, xss:TRUE);
    
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_FIREFOX_16_0.NASL
    descriptionThe installed version of Firefox is earlier than 16.0 and thus, is affected by the following vulnerabilities : - Several memory safety bugs exist in the browser engine used in Mozilla-based products that could be exploited to execute arbitrary code. (CVE-2012-3983) -
    last seen2020-06-01
    modified2020-06-02
    plugin id62576
    published2012-10-17
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/62576
    titleFirefox < 16.0 Multiple Vulnerabilities (Mac OS X)
  • NASL familyWindows
    NASL idSEAMONKEY_213.NASL
    descriptionThe installed version of SeaMonkey is affected by the following vulnerabilities : - Several memory safety bugs exist in the browser engine used in Mozilla-based products that could be exploited to execute arbitrary code. (CVE-2012-3983) -
    last seen2020-06-01
    modified2020-06-02
    plugin id62583
    published2012-10-17
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/62583
    titleSeaMonkey < 2.13 Multiple Vulnerabilities
  • NASL familyWindows
    NASL idMOZILLA_THUNDERBIRD_160.NASL
    descriptionThe installed version of Thunderbird is earlier than 16.0 and thus, is affected by the following vulnerabilities : - Several memory safety bugs exist in the browser engine used in Mozilla-based products that could be exploited to execute arbitrary code. (CVE-2012-3983) -
    last seen2020-06-01
    modified2020-06-02
    plugin id62582
    published2012-10-17
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/62582
    titleMozilla Thunderbird < 16.0 Multiple Vulnerabilities
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201301-01.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201301-01 (Mozilla Products: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Mozilla Firefox, Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could entice a user to view a specially crafted web page or email, possibly resulting in execution of arbitrary code or a Denial of Service condition. Furthermore, a remote attacker may be able to perform Man-in-the-Middle attacks, obtain sensitive information, bypass restrictions and protection mechanisms, force file downloads, conduct XML injection attacks, conduct XSS attacks, bypass the Same Origin Policy, spoof URL&rsquo;s for phishing attacks, trigger a vertical scroll, spoof the location bar, spoof an SSL indicator, modify the browser&rsquo;s font, conduct clickjacking attacks, or have other unspecified impact. A local attacker could gain escalated privileges, obtain sensitive information, or replace an arbitrary downloaded file. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id63402
    published2013-01-08
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/63402
    titleGLSA-201301-01 : Mozilla Products: Multiple vulnerabilities (BEAST)
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_THUNDERBIRD_16_0.NASL
    descriptionThe installed version of Thunderbird is earlier than 16.0 and thus, is affected by the following vulnerabilities : - Several memory safety bugs exist in the browser engine used in Mozilla-based products that could be exploited to execute arbitrary code. (CVE-2012-3983) -
    last seen2020-06-01
    modified2020-06-02
    plugin id62578
    published2012-10-17
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/62578
    titleMozilla Thunderbird < 16.0 Multiple Vulnerabilities (Mac OS X)

Oval

accepted2014-10-06T04:02:23.266-04:00
classvulnerability
contributors
  • nameSergey Artykhov
    organizationALTX-SOFT
  • nameMaria Kedovskaya
    organizationALTX-SOFT
  • nameShane Shaffer
    organizationG2, Inc.
  • nameMaria Kedovskaya
    organizationALTX-SOFT
  • nameRichard Helbing
    organizationbaramundi software
  • nameEvgeniy Pavlov
    organizationALTX-SOFT
  • nameEvgeniy Pavlov
    organizationALTX-SOFT
  • nameEvgeniy Pavlov
    organizationALTX-SOFT
  • nameEvgeniy Pavlov
    organizationALTX-SOFT
  • nameEvgeniy Pavlov
    organizationALTX-SOFT
  • nameEvgeniy Pavlov
    organizationALTX-SOFT
definition_extensions
  • commentMozilla Thunderbird Mainline release is installed
    ovaloval:org.mitre.oval:def:22093
  • commentMozilla Seamonkey is installed
    ovaloval:org.mitre.oval:def:6372
  • commentMozilla Firefox Mainline release is installed
    ovaloval:org.mitre.oval:def:22259
descriptionMozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly handle navigation away from a web page that has multiple menus of SELECT elements active, which allows remote attackers to conduct clickjacking attacks via vectors involving an XPI file, the window.open method, and the Geolocation API, a different vulnerability than CVE-2012-3984.
familywindows
idoval:org.mitre.oval:def:16972
statusaccepted
submitted2013-05-13T10:26:26.748+04:00
titleMozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly handle navigation away from a web page that has multiple menus of SELECT elements active, which allows remote attackers to conduct clickjacking attacks via vectors involving an XPI file, the window.open method, and the Geolocation API, a different vulnerability than CVE-2012-3984.
version34