CVE-2013-6167
Publication date 15 February 2014
Last updated 24 July 2024
Ubuntu priority
Description
Mozilla Firefox through 27 sends HTTP Cookie headers without first validating that they have the required character-set restrictions, which allows remote attackers to conduct the equivalent of a persistent Logout CSRF attack via a crafted parameter that forces a web application to set a malformed cookie within an HTTP response.
Status
Package | Ubuntu Release | Status |
---|---|---|
firefox | ||
16.04 LTS xenial | Ignored | |
14.04 LTS trusty | Not in release | |
seamonkey | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
thunderbird | ||
16.04 LTS xenial | Ignored | |
14.04 LTS trusty | Not in release | |
xulrunner-1.9.2 | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
Notes
chrisccoulson
The upstream Mozilla bug is marked as wontfix. This only affects cookies set via document.cookie (A similar issue for cookies set via the HTTP Set-Cookie header was fixed in CVE-2016-1939)