Rapid7 Vulnerability & Exploit Database

SUSE Linux Security Vulnerability: CVE-2010-3178

Back to Search

SUSE Linux Security Vulnerability: CVE-2010-3178

Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
10/21/2010
Created
07/25/2018
Added
02/17/2015
Modified
07/04/2017

Description

Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 do not properly handle certain modal calls made by javascript: URLs in circumstances related to opening a new window and performing cross-domain navigation, which allows remote attackers to bypass the Same Origin Policy via a crafted HTML document.

Solution(s)

  • suse-upgrade-enigmail
  • suse-upgrade-gconf2
  • suse-upgrade-gconf2-32bit
  • suse-upgrade-gconf2-x86
  • suse-upgrade-libfreebl3
  • suse-upgrade-libfreebl3-32bit
  • suse-upgrade-libfreebl3-x86
  • suse-upgrade-libidl
  • suse-upgrade-libidl-32bit
  • suse-upgrade-libidl-x86
  • suse-upgrade-mozilla-js192
  • suse-upgrade-mozilla-js192-32bit
  • suse-upgrade-mozilla-nspr
  • suse-upgrade-mozilla-nspr-32bit
  • suse-upgrade-mozilla-nspr-x86
  • suse-upgrade-mozilla-nss
  • suse-upgrade-mozilla-nss-32bit
  • suse-upgrade-mozilla-nss-tools
  • suse-upgrade-mozilla-nss-x86
  • suse-upgrade-mozilla-xulrunner190
  • suse-upgrade-mozilla-xulrunner190-32bit
  • suse-upgrade-mozilla-xulrunner190-gnomevfs
  • suse-upgrade-mozilla-xulrunner190-translations
  • suse-upgrade-mozilla-xulrunner190-x86
  • suse-upgrade-mozilla-xulrunner191
  • suse-upgrade-mozilla-xulrunner191-32bit
  • suse-upgrade-mozilla-xulrunner191-devel
  • suse-upgrade-mozilla-xulrunner191-gnomevfs
  • suse-upgrade-mozilla-xulrunner191-gnomevfs-32bit
  • suse-upgrade-mozilla-xulrunner191-translations
  • suse-upgrade-mozilla-xulrunner191-translations-32bit
  • suse-upgrade-mozilla-xulrunner191-translations-common
  • suse-upgrade-mozilla-xulrunner191-translations-other
  • suse-upgrade-mozilla-xulrunner191-x86
  • suse-upgrade-mozilla-xulrunner192
  • suse-upgrade-mozilla-xulrunner192-32bit
  • suse-upgrade-mozilla-xulrunner192-buildsymbols
  • suse-upgrade-mozilla-xulrunner192-devel
  • suse-upgrade-mozilla-xulrunner192-gnome
  • suse-upgrade-mozilla-xulrunner192-gnome-32bit
  • suse-upgrade-mozilla-xulrunner192-translations
  • suse-upgrade-mozilla-xulrunner192-translations-common
  • suse-upgrade-mozilla-xulrunner192-translations-common-32bit
  • suse-upgrade-mozilla-xulrunner192-translations-other
  • suse-upgrade-mozilla-xulrunner192-translations-other-32bit
  • suse-upgrade-mozilla-xulrunner192-x86
  • suse-upgrade-mozillafirefox
  • suse-upgrade-mozillafirefox-branding-sled
  • suse-upgrade-mozillafirefox-branding-upstream
  • suse-upgrade-mozillafirefox-translations
  • suse-upgrade-mozillafirefox-translations-common
  • suse-upgrade-mozillafirefox-translations-other
  • suse-upgrade-mozillathunderbird
  • suse-upgrade-mozillathunderbird-devel
  • suse-upgrade-mozillathunderbird-translations-common
  • suse-upgrade-mozillathunderbird-translations-other
  • suse-upgrade-orbit2
  • suse-upgrade-orbit2-32bit
  • suse-upgrade-orbit2-x86
  • suse-upgrade-python-xpcom191
  • suse-upgrade-sap-aio-release
  • suse-upgrade-seamonkey
  • suse-upgrade-seamonkey-dom-inspector
  • suse-upgrade-seamonkey-irc
  • suse-upgrade-seamonkey-translations-common
  • suse-upgrade-seamonkey-translations-other
  • suse-upgrade-seamonkey-venkman

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;