Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly handle onLocationChange events during navigation between different https sites, which allows remote attackers to spoof the X.509 certificate information in the address bar via a crafted web page.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16060
https://bugzilla.mozilla.org/show_bug.cgi?id=768568
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
http://www.ubuntu.com/usn/USN-1548-2
http://www.ubuntu.com/usn/USN-1548-1
http://www.securityfocus.com/bid/55313
http://www.mozilla.org/security/announce/2012/mfsa2012-69.html
http://rhn.redhat.com/errata/RHSA-2012-1210.html
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html