Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 630074 - (CVE-2010-2768) CVE-2010-2768 Mozilla UTF-7 XSS by overriding document charset using <object> type attribute (MFSA 2010-61)
CVE-2010-2768 Mozilla UTF-7 XSS by overriding document charset using <object>...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
public=20100907,reported=20100901,sou...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2010-09-03 12:08 EDT by Josh Bressers
Modified: 2016-03-04 07:23 EST (History)
5 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-04-12 14:45:04 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2010:0680 normal SHIPPED_LIVE Critical: seamonkey security update 2010-09-07 21:09:16 EDT
Red Hat Product Errata RHSA-2010:0681 normal SHIPPED_LIVE Critical: firefox security update 2010-09-07 20:33:03 EDT
Red Hat Product Errata RHSA-2010:0682 normal SHIPPED_LIVE Moderate: thunderbird security update 2010-09-07 20:06:28 EDT

  None (edit)
Description Josh Bressers 2010-09-03 12:08:46 EDT
Security researchers David Lin-Shung Huang and Collin Jackson of Carnegie
Mellon University CyLab reported that the type attribute of an <object> tag
can override the charset of a framed HTML document, even when the document
is included across origins. A page could be constructed containing such an
<object> tag which sets the charset of the framed document to UTF-7. This
could potentially allow an attacker to inject UTF-7 encoded JavaScript into
a site, bypassing the site's XSS filters, and then executing the code using
the above technique.
Comment 1 Vincent Danen 2010-09-07 19:32:19 EDT
This is now public:

http://www.mozilla.org/security/announce/2010/mfsa2010-61.html
Comment 2 errata-xmlrpc 2010-09-07 20:06:57 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4
  Red Hat Enterprise Linux 5

Via RHSA-2010:0682 https://rhn.redhat.com/errata/RHSA-2010-0682.html
Comment 3 errata-xmlrpc 2010-09-07 20:34:13 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4
  Red Hat Enterprise Linux 5

Via RHSA-2010:0681 https://rhn.redhat.com/errata/RHSA-2010-0681.html
Comment 4 errata-xmlrpc 2010-09-07 21:10:18 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 3
  Red Hat Enterprise Linux 4

Via RHSA-2010:0680 https://rhn.redhat.com/errata/RHSA-2010-0680.html

Note You need to log in before you can comment on or make changes to this bug.