Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to bypass CORS preflight protection mechanisms by leveraging (1) duplicate cache-key generation or (2) retrieval of a value from an incorrect HTTP Access-Control-* response header.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firefox | Mozilla | 38.0 (including) | 38.0 (including) |
Firefox | Mozilla | 38.0.1 (including) | 38.0.1 (including) |
Firefox | Mozilla | 38.0.5 (including) | 38.0.5 (including) |
Firefox | Mozilla | 38.1.0 (including) | 38.1.0 (including) |
Firefox | Mozilla | 38.1.1 (including) | 38.1.1 (including) |
Firefox | Mozilla | 38.2.0 (including) | 38.2.0 (including) |
Firefox | Mozilla | 38.2.1 (including) | 38.2.1 (including) |
Red Hat Enterprise Linux 5 | RedHat | firefox-0:38.3.0-2.el5_11 | * |
Red Hat Enterprise Linux 5 | RedHat | thunderbird-0:38.3.0-1.el5_11 | * |
Red Hat Enterprise Linux 6 | RedHat | firefox-0:38.3.0-2.el6_7 | * |
Red Hat Enterprise Linux 6 | RedHat | thunderbird-0:38.3.0-1.el6_7 | * |
Red Hat Enterprise Linux 7 | RedHat | firefox-0:38.3.0-2.el7_1 | * |
Red Hat Enterprise Linux 7 | RedHat | thunderbird-0:38.3.0-1.ael7b_1 | * |
Firefox | Ubuntu | devel | * |
Firefox | Ubuntu | precise | * |
Firefox | Ubuntu | trusty | * |
Firefox | Ubuntu | upstream | * |
Firefox | Ubuntu | vivid | * |
Thunderbird | Ubuntu | devel | * |
Thunderbird | Ubuntu | precise | * |
Thunderbird | Ubuntu | trusty | * |
Thunderbird | Ubuntu | upstream | * |
Thunderbird | Ubuntu | vivid | * |