Bug 229253 (CVE-2007-0981)

Summary: CVE-2007-0981: seamonkey cookie setting / same-domain bypass vulnerability
Product: [Other] Security Response Reporter: Ville Skytt√§ <ville.skytta>
Component: vulnerabilityAssignee: Kai Engert (:kaie) (inactive account) <kengert>
Status: CLOSED CURRENTRELEASE QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: fedora-security-list
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: seamonkey-1.0.8-0.6.2.fc6 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2007-04-17 23:26:11 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Ville Skyttä 2007-02-19 19:24:44 UTC

"Mozilla based browsers allows remote attackers to bypass the same origin
policy, steal cookies, and conduct other attacks by writing a URI with a null
byte to the hostname (location.hostname) DOM property, due to interactions with
DNS resolver code."

Seamonkey seems vulnerable.  See also

Comment 1 Kai Engert (:kaie) (inactive account) 2007-04-17 23:26:11 UTC
The SeaMonkey version in Fedora Extras 6 is 1.0.8.

SeaMonkey 1.0.8 is based on Mozilla technology version

The underlying bug at mozilla.org has been marked as fixed and verified

So I conclude this bug has been fixed in seamonkey-1.0.8-0.6.2.fc6 since 2007-03-01.