Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2009-06-12T21:07:00
Updated: 2024-08-07T05:27:54.628Z
Reserved: 2009-05-29T00:00:00
Link: CVE-2009-1836
Vulnrichment
No data.
NVD
Status : Modified
Published: 2009-06-12T21:30:00.327
Modified: 2024-11-21T01:03:29.680
Link: CVE-2009-1836
Redhat