CVE-2015-4476

MEDIUM

Description

Mozilla Firefox before 41.0 on Android allows user-assisted remote attackers to spoof address-bar attributes by leveraging lack of navigation after a paste of a URL with a nonstandard scheme, as demonstrated by spoofing an SSL attribute.

References

http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html

http://www.mozilla.org/security/announce/2015/mfsa2015-99.html

http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html

http://www.securityfocus.com/bid/76815

http://www.securitytracker.com/id/1033640

https://bugzilla.mozilla.org/show_bug.cgi?id=1162372

Details

Source: MITRE

Published: 2015-09-24

Updated: 2016-12-22

Type: CWE-254

Risk Information

CVSS v2.0

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

Tenable Plugins

View all (3 total)

IDNameProductFamilySeverity
9017Mozilla Firefox for Android < 41.0 Unknown Protocol Pasted URL Handling SpoofingNessus Network MonitorMobile Devices
medium
86238openSUSE Security Update : MozillaFirefox (openSUSE-2015-619)NessusSuSE Local Security Checks
high
86079FreeBSD : mozilla -- multiple vulnerabilities (2d56c7f4-b354-428f-8f48-38150c607a05)NessusFreeBSD Local Security Checks
high