CVE-2015-0812

medium

Description

Mozilla Firefox before 37.0 does not require an HTTPS session for lightweight theme add-on installations, which allows man-in-the-middle attackers to bypass an intended user-confirmation requirement by deploying a crafted web site and conducting a DNS spoofing attack against a mozilla.org subdomain.

References

https://security.gentoo.org/glsa/201512-10

https://bugzilla.mozilla.org/show_bug.cgi?id=1128126

http://www.ubuntu.com/usn/USN-2550-1

http://www.securitytracker.com/id/1031996

http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html

http://www.mozilla.org/security/announce/2015/mfsa2015-32.html

http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html

Details

Source: Mitre, NVD

Published: 2015-04-01

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N

Severity: Medium