Mozilla Firefox 4.x through 11.0, Thunderbird 5.0 through 11.0, and SeaMonkey before 2.9 do not properly construct the Origin and Sec-WebSocket-Origin HTTP headers, which might allow remote attackers to bypass an IPv6 literal ACL via a cross-site (1) XMLHttpRequest or (2) WebSocket operation involving a nonstandard port number and an IPv6 address that contains certain zero fields.
Metrics
Affected Vendors & Products
References
History
Wed, 28 May 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
Thu, 22 May 2025 04:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |

Status: PUBLISHED
Assigner: mitre
Published: 2012-04-25T10:00:00
Updated: 2024-08-06T18:23:31.021Z
Reserved: 2012-01-09T00:00:00
Link: CVE-2012-0475

No data.

Status : Deferred
Published: 2012-04-25T10:10:17.683
Modified: 2025-04-11T00:51:21.963
Link: CVE-2012-0475
