CVE-2013-6167
Publication date 15 February 2014
Last updated 24 July 2024
Ubuntu priority
Mozilla Firefox through 27 sends HTTP Cookie headers without first validating that they have the required character-set restrictions, which allows remote attackers to conduct the equivalent of a persistent Logout CSRF attack via a crafted parameter that forces a web application to set a malformed cookie within an HTTP response.
Status
Package | Ubuntu Release | Status |
---|---|---|
firefox | ||
16.04 LTS xenial | Ignored | |
14.04 LTS trusty | Not in release | |
seamonkey | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
thunderbird | ||
16.04 LTS xenial | Ignored | |
14.04 LTS trusty | Not in release | |
xulrunner-1.9.2 | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
Notes
chrisccoulson
The upstream Mozilla bug is marked as wontfix. This only affects cookies set via document.cookie (A similar issue for cookies set via the HTTP Set-Cookie header was fixed in CVE-2016-1939)