CVE-2014-8639

CVE Details

Release Date:2015-01-13

Description


Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.

See more information about CVE-2014-8639 from MITRE CVE dictionary and NIST NVD


CVSS v2.0 metrics


NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.

Base Score: 4.3 Base Metrics: AV:N/AC:M/Au:N/C:N/I:P/A:N
Access Vector: Network Attack Complexity: Medium
Authentication: None required Confidentiality Impact: None
Integrity Impact: Partial Availability Impact: None

Errata information


PlatformErrataRelease Date
Oracle Linux version 5 (firefox)ELSA-2015-00462015-01-14
Oracle Linux version 5 (thunderbird)ELSA-2015-00472015-01-13
Oracle Linux version 6 (firefox)ELSA-2015-00462015-01-14
Oracle Linux version 6 (thunderbird)ELSA-2015-00472015-01-13
Oracle Linux version 7 (firefox)ELSA-2015-00462015-01-14
Oracle Linux version 7 (xulrunner)ELSA-2015-00462015-01-14



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete