2012-07-18 12:26:49 2017-12-29 03:29:17

Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 do not properly handle duplicate values in X-Frame-Options headers, which makes it easier for remote attackers to conduct clickjacking attacks via a FRAME element referencing a web site that produces these duplicate values.

Vector

NETWORK

Complexity

MEDIUM

Authentication

NONE

Confidentiality

NONE

Integrity

PARTIAL

Availability

NONE
Mozilla Thunderbird 10.0.4 Mozilla Thunderbird 10.0.3 Mozilla Thunderbird 10.0.2 Mozilla Thunderbird 10.0.1 Mozilla Thunderbird 10.0 Mozilla Thunderbird 9.0.1 Mozilla Thunderbird 9.0 Mozilla Thunderbird 8.0 Mozilla Thunderbird 7.0.1 Mozilla Thunderbird 7.0 Mozilla Thunderbird 6.0.2 Mozilla Thunderbird 6.0.1 Mozilla Thunderbird 6.0 Mozilla Thunderbird 5.0 Mozilla SeaMonkey 2.10 Mozilla SeaMonkey 2.1 Release Candidate 2 Mozilla SeaMonkey 2.1 Release Candidate 1 Mozilla SeaMonkey 2.1 Beta 3 Mozilla SeaMonkey 2.1 Beta 2 Mozilla SeaMonkey 2.1 Beta 1 Mozilla SeaMonkey 2.1 alpha3 Mozilla SeaMonkey 2.1 alpha2 Mozilla SeaMonkey 2.1 alpha1 Mozilla SeaMonkey 2.1 Mozilla SeaMonkey 2.0.14 Mozilla SeaMonkey 2.0.13 Mozilla SeaMonkey 2.0.12 Mozilla SeaMonkey 2.0.11 Mozilla SeaMonkey 2.0.10 Mozilla SeaMonkey 2.0.9 Mozilla SeaMonkey 2.0.8 Mozilla SeaMonkey 2.0.7 Mozilla SeaMonkey 2.0.6 Mozilla SeaMonkey 2.0.5 Mozilla SeaMonkey 2.0.4 Mozilla SeaMonkey 2.0.3 Mozilla SeaMonkey 2.0.2 Mozilla SeaMonkey 2.0.1 Mozilla SeaMonkey 2.0 RC2 Mozilla SeaMonkey 2.0 RC1 Mozilla SeaMonkey 2.0 Beta 2 Mozilla SeaMonkey 2.0 Beta 1 Mozilla SeaMonkey 2.0 Alpha 3 Mozilla SeaMonkey 2.0 Alpha 2 Mozilla SeaMonkey 2.0 Mozilla SeaMonkey 2.0 Alpha 1 Mozilla SeaMonkey 1.5.0.10 Mozilla SeaMonkey 1.5.0.9 Mozilla SeaMonkey 1.5.0.8 Mozilla Seamonkey 1.1.19 Mozilla Seamonkey 1.1.18 Mozilla SeaMonkey 1.1.17 Mozilla SeaMonkey 1.1.16 Mozilla SeaMonkey 1.1.15 Mozilla SeaMonkey 1.1.14 Mozilla SeaMonkey 1.1.13 Mozilla SeaMonkey 1.1.12 Mozilla SeaMonkey 1.1.11 Mozilla SeaMonkey 1.1.10 Mozilla SeaMonkey 1.1.9 Mozilla SeaMonkey 1.1.8 Mozilla Seamonkey 1.1.7 Mozilla Seamonkey 1.1.6 Mozilla Seamonkey 1.1.5 Mozilla Seamonkey 1.1.4 Mozilla Seamonkey 1.1.3 Mozilla Seamonkey 1.1.2 Mozilla Seamonkey 1.1.1 Mozilla SeaMonkey 1.1 beta Mozilla SeaMonkey 1.1 alpha Mozilla SeaMonkey 1.1 Mozilla SeaMonkey 1.0.9 Mozilla SeaMonkey 1.0.8 Mozilla SeaMonkey 1.0.7 Mozilla SeaMonkey 1.0.6 Mozilla SeaMonkey 1.0.5 Mozilla SeaMonkey 1.0.4 Mozilla SeaMonkey 1.0.3 Mozilla SeaMonkey 1.0.2 Mozilla SeaMonkey 1.0.1 Mozilla SeaMonkey 1.0 beta Mozilla SeaMonkey 1.0 alpha Mozilla SeaMonkey 1.0 Mozilla Firefox Extended Support Release (ESR) 10.0.5 Mozilla Firefox Extended Support Release (ESR) 10.0.4 Mozilla Firefox Extended Support Release (ESR) 10.0.3 Mozilla Firefox Extended Support Release (ESR) 10.0.2 Mozilla Firefox Extended Support Release (ESR) 10.1 Mozilla Firefox Extended Support Release (ESR) 10.0 Mozilla Firefox 13.0 Mozilla Firefox 12.0 beta6 Mozilla Firefox 12.0 Mozilla Firefox 11.0 Mozilla Firefox 9.0.1 Mozilla Firefox 9.0 Mozilla Firefox 8.0.1 Mozilla Firefox 8.0 Mozilla Firefox 7.0.1 Mozilla Firefox 7.0 Mozilla Firefox 6.0.2 Mozilla Firefox 6.0.1 Mozilla Firefox 6.0 Mozilla Firefox 5.0.1 Mozilla Firefox 5.0 Mozilla Firefox 4.0.1 Mozilla Firefox 4.0 beta9 Mozilla Firefox 4.0 beta8 Mozilla Firefox 4.0 beta7 Mozilla Firefox 4.0 beta6 Mozilla Firefox 4.0 beta5 Mozilla Firefox 4.0 beta4 Mozilla Firefox 4.0 beta3 Mozilla Firefox 4.0 beta2 Mozilla Firefox 4.0 beta12 Mozilla Firefox 4.0 beta11 Mozilla Firefox 4.0 beta10 Mozilla Firefox 4.0 beta1 Mozilla Firefox 4.0 Mozilla Thunderbird 11.0 Mozilla Thunderbird 12.0 Mozilla Thunderbird 13.0 Mozilla Thunderbird Extended Support Release (ESR) 10.0 Mozilla Thunderbird Extended Support Release (ESR) 10.0.1 Mozilla Thunderbird Extended Support Release (ESR) 10.0.2 Mozilla Thunderbird Extended Support Release (ESR) 10.0.3 Mozilla Thunderbird Extended Support Release (ESR) 10.0.4 Mozilla Thunderbird Extended Support Release (ESR) 10.0.5

Improper Input Validation (ID 20)

Related CAPEC 58 Buffer Overflow via Environment Variables (CAPEC-ID 10) Server Side Include (SSI) Injection (CAPEC-ID 101) Cross Zone Scripting (CAPEC-ID 104) Cross Site Scripting through Log Files (CAPEC-ID 106) Command Line Execution through SQL Injection (CAPEC-ID 108) Object Relational Mapping Injection (CAPEC-ID 109) SQL Injection through SOAP Parameter Tampering (CAPEC-ID 110) Subverting Environment Variable Values (CAPEC-ID 13) Format String Injection (CAPEC-ID 135) LDAP Injection (CAPEC-ID 136) Relative Path Traversal (CAPEC-ID 139) Client-side Injection-induced Buffer Overflow (CAPEC-ID 14) Variable Manipulation (CAPEC-ID 171) Embedding Scripts in Non-Script Elements (CAPEC-ID 18) Flash Injection (CAPEC-ID 182) Cross-Site Scripting Using Alternate Syntax (CAPEC-ID 199) Exploiting Trust in Client (aka Make the Client Invisible) (CAPEC-ID 22) XML Nested Payloads (CAPEC-ID 230) XML Oversized Payloads (CAPEC-ID 231) Filter Failure through Buffer Overflow (CAPEC-ID 24) Cross-Site Scripting via Encoded URI Schemes (CAPEC-ID 244) XML Injection (CAPEC-ID 250) Environment Variable Manipulation (CAPEC-ID 264) Global variable manipulation (CAPEC-ID 265) Leverage Alternate Encoding (CAPEC-ID 267) Fuzzing (CAPEC-ID 28) Using Leading 'Ghost' Character Sequences to Bypass Input Filters (CAPEC-ID 3) Accessing/Intercepting/Modifying HTTP Cookies (CAPEC-ID 31) Embedding Scripts in HTTP Query Strings (CAPEC-ID 32) MIME Conversion (CAPEC-ID 42) Exploiting Multiple Input Interpretation Layers (CAPEC-ID 43) Buffer Overflow via Symbolic Links (CAPEC-ID 45) Overflow Variables and Tags (CAPEC-ID 46) Buffer Overflow via Parameter Expansion (CAPEC-ID 47) Signature Spoof (CAPEC-ID 473) XML Client-Side Attack (CAPEC-ID 484) Embedding NULL Bytes (CAPEC-ID 52) Postfix, Null Terminate, and Backslash (CAPEC-ID 53) Simple Script Injection (CAPEC-ID 63) Using Slashes and URL Encoding Combined to Bypass Validation Logic (CAPEC-ID 64) SQL Injection (CAPEC-ID 66) String Format Overflow in syslog() (CAPEC-ID 67) Blind SQL Injection (CAPEC-ID 7) Using Unicode Encoding to Bypass Validation Logic (CAPEC-ID 71) URL Encoding (CAPEC-ID 72) User-Controlled Filename (CAPEC-ID 73) Using Escaped Slashes in Alternate Encoding (CAPEC-ID 78) Using Slashes in Alternate Encoding (CAPEC-ID 79) Buffer Overflow in an API Call (CAPEC-ID 8) Using UTF-8 Encoding to Bypass Validation Logic (CAPEC-ID 80) Web Logs Tampering (CAPEC-ID 81) XPath Injection (CAPEC-ID 83) AJAX Fingerprinting (CAPEC-ID 85) Embedding Script (XSS) in HTTP Headers (CAPEC-ID 86) OS Command Injection (CAPEC-ID 88) Buffer Overflow in Local Command-Line Utilities (CAPEC-ID 9) XSS in IMG Tags (CAPEC-ID 91) XML Parser Attack (CAPEC-ID 99)