Bug 1066219 (CVE-2013-6167) - CVE-2013-6167 Mozilla: browser document.cookie DoS vulnerability
Summary: CVE-2013-6167 Mozilla: browser document.cookie DoS vulnerability
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2013-6167
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1066222
TreeView+ depends on / blocked
 
Reported: 2014-02-18 04:51 UTC by Murray McAllister
Modified: 2021-10-20 10:43 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-10-20 10:43:47 UTC
Embargoed:


Attachments (Terms of Use)

Description Murray McAllister 2014-02-18 04:51:16 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2013-6167 to
the following vulnerability:

Name: CVE-2013-6167
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6167
Assigned: 20131016
Reference: http://www.openwall.com/lists/oss-security/2013/04/03/10
Reference: http://seclists.org/oss-sec/2013/q4/117
Reference: http://seclists.org/oss-sec/2013/q4/121
Reference: http://redmine.lighttpd.net/issues/2188
Reference: https://bugzilla.mozilla.org/show_bug.cgi?id=858215

Mozilla Firefox through 27 sends HTTP Cookie headers without first
validating that they have the required character-set restrictions,
which allows remote attackers to conduct the equivalent of a
persistent Logout CSRF attack via a crafted parameter that forces a
web application to set a malformed cookie within an HTTP response.

Comment 1 Murray McAllister 2014-02-18 04:52:48 UTC
This is waiting to be fixed upstream (https://bugzilla.mozilla.org/show_bug.cgi?id=858215)

Statement:

This issue affects the version of firefox as shipped with Red Hat Enterprise Linux 5 and 6. Upstream does not include moderate impact fixes in the Extended Support Releases. This issue will be addressed in the next ESR rebase.


Note You need to log in before you can comment on or make changes to this bug.