CVE-2011-2993

HIGH

Description

The implementation of digital signatures for JAR files in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, and possibly other products does not prevent calls from unsigned JavaScript code to signed code, which allows remote attackers to bypass the Same Origin Policy and gain privileges via a crafted web site, a different vulnerability than CVE-2008-2801.

References

http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html

http://www.mozilla.org/security/announce/2011/mfsa2011-29.html

http://www.mozilla.org/security/announce/2011/mfsa2011-33.html

https://bugzilla.mozilla.org/show_bug.cgi?id=657267

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14055

Details

Source: MITRE

Published: 2011-08-18

Updated: 2017-09-19

Type: CWE-264

Risk Information

CVSS v2.0

Base Score: 9.3

Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)

Impact Score: 10

Exploitability Score: 8.6

Severity: HIGH