Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not properly handle HTTP responses that contain multiple Location, Content-Length, or Content-Disposition headers, which makes it easier for remote attackers to conduct HTTP response splitting attacks via crafted header values.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14361
https://bugzilla.mozilla.org/show_bug.cgi?id=655389
http://www.redhat.com/support/errata/RHSA-2011-1341.html
http://www.mozilla.org/security/announce/2011/mfsa2011-39.html
http://www.mandriva.com/security/advisories?name=MDVSA-2011:142
http://www.mandriva.com/security/advisories?name=MDVSA-2011:141
http://www.mandriva.com/security/advisories?name=MDVSA-2011:140
http://www.mandriva.com/security/advisories?name=MDVSA-2011:139
http://www.debian.org/security/2011/dsa-2317
http://www.debian.org/security/2011/dsa-2313
http://www.debian.org/security/2011/dsa-2312
http://secunia.com/advisories/46315
http://lists.opensuse.org/opensuse-updates/2011-10/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html