CVE-2015-4520
Published: 22 September 2015
Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to bypass CORS preflight protection mechanisms by leveraging (1) duplicate cache-key generation or (2) retrieval of a value from an incorrect HTTP Access-Control-* response header.
Priority
Status
Package | Release | Status |
---|---|---|
firefox Launchpad, Ubuntu, Debian |
precise |
Released
(41.0+build3-0ubuntu0.12.04.1)
|
trusty |
Does not exist
(trusty was released [41.0+build3-0ubuntu0.14.04.1])
|
|
upstream |
Released
(41.0)
|
|
vivid |
Released
(41.0+build3-0ubuntu0.15.04.1)
|
|
thunderbird Launchpad, Ubuntu, Debian |
precise |
Released
(1:38.3.0+build1-0ubuntu0.12.04.1)
|
trusty |
Does not exist
(trusty was released [1:38.3.0+build1-0ubuntu0.14.04.1])
|
|
upstream |
Released
(38.3.0)
|
|
vivid |
Released
(1:38.3.0+build1-0ubuntu0.15.04.1)
|