This service will be undergoing maintenance at 00:00 UTC, 2016-08-01. It is expected to last about 1 hours

Bug 741905 (CVE-2011-3000)

Summary: CVE-2011-3000 Mozilla: Defense against multiple Location headers due to CRLF Injection (MFSA 2011-39)
Product: [Other] Security Response Reporter: Huzaifa S. Sidhpurwala <huzaifas>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: urgent Docs Contact:
Priority: urgent    
Version: unspecifiedCC: caillon, gecko-bugs-nobody, stransky, vdanen
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=critical,public=20110928,reported=20110928,source=mozilla,cvss2=6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P,rhel-6.1.z/firefox=affected,rhel-5.7.z/firefox=affected,rhel-4.9/firefox=affected,rhel-6.1.z/thunderbird=affected,rhel-5.7.z/thunderbird=affected,rhel-4.9/thunderbird=affected,rhel-4.9/seamonkey=affected
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-09-28 20:26:00 EDT Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:

Description Huzaifa S. Sidhpurwala 2011-09-28 08:47:55 EDT
Ian Graham of Citrix Online reported that when multiple Location headers were present in a redirect response Mozilla behavior differed from other browsers: Mozilla would use the second Location header while Chrome and Internet Explorer would use the first. Two copies of this header with different values could be a symptom of a CRLF injection attack against a vulnerable server. Most commonly it is the Location header itself that is vulnerable to the response splitting and therefore the copy preferred by Mozilla is more likely to be the malicious one. It is possible, however, that the first copy was the injected one depending on the nature of the server vulnerability.

The Mozilla browser engine has been changed to treat two copies of this header with different values as an error condition. The same has been done with the headers Content-Length and Content-Disposition 

References:
http://www.mozilla.org/security/announce/2011/mfsa2011-39.html
https://bugzilla.mozilla.org/show_bug.cgi?id=655389
Comment 1 errata-xmlrpc 2011-09-28 19:12:33 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2011:1342 https://rhn.redhat.com/errata/RHSA-2011-1342.html
Comment 2 errata-xmlrpc 2011-09-28 19:44:17 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 4
  Red Hat Enterprise Linux 6

Via RHSA-2011:1341 https://rhn.redhat.com/errata/RHSA-2011-1341.html