Mozilla Firefox before 41.0 on Android allows user-assisted remote attackers to spoof address-bar attributes by leveraging lack of navigation after a paste of a URL with a nonstandard scheme, as demonstrated by spoofing an SSL attribute.
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html
http://www.mozilla.org/security/announce/2015/mfsa2015-99.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/76815
AND
OR
OR
ID | Name | Product | Family | Severity |
---|---|---|---|---|
9017 | Mozilla Firefox for Android < 41.0 Unknown Protocol Pasted URL Handling Spoofing | Nessus Network Monitor | Mobile Devices | medium |
86238 | openSUSE Security Update : MozillaFirefox (openSUSE-2015-619) | Nessus | SuSE Local Security Checks | high |
86079 | FreeBSD : mozilla -- multiple vulnerabilities (2d56c7f4-b354-428f-8f48-38150c607a05) | Nessus | FreeBSD Local Security Checks | high |