Mozilla security researcher moz_bug_r_a4 reported a series of
vulnerabilities in which objects that normally receive a
XPCCrossOriginWrapper are constructed without the wrapper. This can lead to
such an object which had been set by a different website. A malicious
website could use this vulnerability to launch a XSS attack and run
This issue has been addressed in following products:
Red Hat Enterprise Linux 5
Red Hat Enterprise Linux 4
Via RHSA-2009:1162 https://rhn.redhat.com/errata/RHSA-2009-1162.html
MITRE's CVE-2009-2472 entry:
Mozilla Firefox before 3.0.12 does not always use
XPCCrossOriginWrapper when required during object construction, which
allows remote attackers to bypass the Same Origin Policy and conduct
cross-site scripting (XSS) attacks via a crafted document, related to
a "cross origin wrapper bypass."
devhelp-0.22-10.fc10, blam-1.8.5-12.fc10, gecko-sharp2-0.13-10.fc10, galeon-2.0.7-12.fc10, gnome-python2-extras-2.19.1-32.fc10, evolution-rss-0.1.2-8.fc10, gnome-web-photo-0.3-20.fc10, mozvoikko-0.9.5-12.fc10, google-gadgets-0.10.5-8.fc10, kazehakase-0.5.6-4.fc10.4, mugshot-1.2.2-11.fc10, yelp-2.24.0-11.fc10, ruby-gnome2-0.19.0-3.fc10.1, Miro-2.0.5-2.fc10, epiphany-2.24.3-8.fc10, pcmanx-gtk2-0.3.8-11.fc10, xulrunner-18.104.22.168-1.fc10, firefox-3.0.12-1.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report.