Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict write access to the window.fullScreen object, which allows remote attackers to spoof the user interface via a crafted web page.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html | vendor-advisory x_refsource_SUSE x_transferred |
| http://secunia.com/advisories/48402 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html | vendor-advisory x_refsource_SUSE x_transferred |
| http://www.ubuntu.com/usn/USN-1400-5 | vendor-advisory x_refsource_UBUNTU x_transferred |
| http://secunia.com/advisories/48359 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.ubuntu.com/usn/USN-1400-4 | vendor-advisory x_refsource_UBUNTU x_transferred |
| http://secunia.com/advisories/48629 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.mozilla.org/security/announce/2012/mfsa2012-18.html | x_refsource_CONFIRM x_transferred |
| http://www.ubuntu.com/usn/USN-1400-3 | vendor-advisory x_refsource_UBUNTU x_transferred |
| http://rhn.redhat.com/errata/RHSA-2012-0387.html | vendor-advisory x_refsource_REDHAT x_transferred |
| http://secunia.com/advisories/48496 | third-party-advisory x_refsource_SECUNIA x_transferred |
| https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15114 | vdb-entry signature x_refsource_OVAL x_transferred |
| http://secunia.com/advisories/49055 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.ubuntu.com/usn/USN-1400-2 | vendor-advisory x_refsource_UBUNTU x_transferred |
| http://www.mandriva.com/security/advisories?name=MDVSA-2012:032 | vendor-advisory x_refsource_MANDRIVA x_transferred |
| http://www.securitytracker.com/id?1026803 | vdb-entry x_refsource_SECTRACK x_transferred |
| http://secunia.com/advisories/48553 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.ubuntu.com/usn/USN-1400-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
| http://secunia.com/advisories/48561 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://rhn.redhat.com/errata/RHSA-2012-0388.html | vendor-advisory x_refsource_REDHAT x_transferred |
| https://bugzilla.mozilla.org/show_bug.cgi?id=727303 | x_refsource_CONFIRM x_transferred |
| http://www.securitytracker.com/id?1026801 | vdb-entry x_refsource_SECTRACK x_transferred |
| http://www.securitytracker.com/id?1026804 | vdb-entry x_refsource_SECTRACK x_transferred |
| http://secunia.com/advisories/48513 | third-party-advisory x_refsource_SECUNIA x_transferred |