Access Restriction Bypass Affecting nss-devel package, versions <0:3.12.2.0-4.el5


Severity

Recommended
critical

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
0.47% (76th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE5-NSSDEVEL-2448372
  • published10 Apr 2022
  • disclosed4 Feb 2009

Introduced: 4 Feb 2009

CVE-2009-0357  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

Upgrade Oracle:5 nss-devel to version 0:3.12.2.0-4.el5 or higher.
This issue was patched in ELSA-2009-0256.

NVD Description

Note: Versions mentioned in the description apply only to the upstream nss-devel package and not the nss-devel package as distributed by Oracle. See How to fix? for Oracle:5 relevant fixed versions and status.

Mozilla Firefox before 3.0.6 and SeaMonkey before 1.1.15 do not properly restrict access from web pages to the (1) Set-Cookie and (2) Set-Cookie2 HTTP response headers, which allows remote attackers to obtain sensitive information from cookies via XMLHttpRequest calls, related to the HTTPOnly protection mechanism.

CVSS Scores

version 3.1