Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-2486 (GCVE-0-2011-2486)
Vulnerability from cvelistv5 – Published: 2012-11-19 11:00 – Updated: 2024-08-06 23:00- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:00:34.025Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.novell.com/show_bug.cgi?id=702034"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/davidben/nspluginwrapper/commit/7e4ab8e1189846041f955e6c83f72bc1624e7a98"
},
{
"name": "RHSA-2012:1459",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1459.html"
},
{
"name": "1027757",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1027757"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://lwn.net/Alerts/524725/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=715384"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "nspluginwrapper before 1.4.4 does not properly provide access to NPNVprivateModeBool variable settings, which could prevent Firefox plugins from determining if they should run in Private Browsing mode and allow remote attackers to bypass intended access restrictions, as demonstrated using Flash."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-11-19T11:00:00.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.novell.com/show_bug.cgi?id=702034"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/davidben/nspluginwrapper/commit/7e4ab8e1189846041f955e6c83f72bc1624e7a98"
},
{
"name": "RHSA-2012:1459",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1459.html"
},
{
"name": "1027757",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1027757"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://lwn.net/Alerts/524725/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=715384"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2011-2486",
"datePublished": "2012-11-19T11:00:00.000Z",
"dateReserved": "2011-06-15T00:00:00.000Z",
"dateUpdated": "2024-08-06T23:00:34.025Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2011-2486",
"date": "2026-04-24",
"epss": "0.00235",
"percentile": "0.46463"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nspluginwrapper:nspluginwrapper:1.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87E01B32-8F5C-4327-993B-7C43D1B45E7E\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"nspluginwrapper before 1.4.4 does not properly provide access to NPNVprivateModeBool variable settings, which could prevent Firefox plugins from determining if they should run in Private Browsing mode and allow remote attackers to bypass intended access restrictions, as demonstrated using Flash.\"}, {\"lang\": \"es\", \"value\": \"nspluginwrapper antes de v1.4.4 no proporciona adecuadamente acceso a la variable de configuraci\\u00f3n NPNVprivateModeBool, lo que podr\\u00eda impedir a algunos plugins de Firefox a la hora de determinar si se deben ejecutar en el modo de navegaci\\u00f3n privada y permitir de esta forma a atacantes remotos evitar las restricciones de acceso, tal y como se demostr\\u00f3 con el uso inapropiado de Flash.\\r\\n\"}]",
"id": "CVE-2011-2486",
"lastModified": "2024-11-21T01:28:22.993",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:P/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2012-11-19T12:10:48.917",
"references": "[{\"url\": \"http://lwn.net/Alerts/524725/\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1459.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securitytracker.com/id?1027757\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"https://bugzilla.novell.com/show_bug.cgi?id=702034\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=715384\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://github.com/davidben/nspluginwrapper/commit/7e4ab8e1189846041f955e6c83f72bc1624e7a98\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lwn.net/Alerts/524725/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1459.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1027757\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://bugzilla.novell.com/show_bug.cgi?id=702034\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=715384\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/davidben/nspluginwrapper/commit/7e4ab8e1189846041f955e6c83f72bc1624e7a98\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2011-2486\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-11-19T12:10:48.917\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"nspluginwrapper before 1.4.4 does not properly provide access to NPNVprivateModeBool variable settings, which could prevent Firefox plugins from determining if they should run in Private Browsing mode and allow remote attackers to bypass intended access restrictions, as demonstrated using Flash.\"},{\"lang\":\"es\",\"value\":\"nspluginwrapper antes de v1.4.4 no proporciona adecuadamente acceso a la variable de configuraci\u00f3n NPNVprivateModeBool, lo que podr\u00eda impedir a algunos plugins de Firefox a la hora de determinar si se deben ejecutar en el modo de navegaci\u00f3n privada y permitir de esta forma a atacantes remotos evitar las restricciones de acceso, tal y como se demostr\u00f3 con el uso inapropiado de Flash.\\r\\n\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nspluginwrapper:nspluginwrapper:1.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87E01B32-8F5C-4327-993B-7C43D1B45E7E\"}]}]}],\"references\":[{\"url\":\"http://lwn.net/Alerts/524725/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1459.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id?1027757\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://bugzilla.novell.com/show_bug.cgi?id=702034\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=715384\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://github.com/davidben/nspluginwrapper/commit/7e4ab8e1189846041f955e6c83f72bc1624e7a98\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lwn.net/Alerts/524725/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1459.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1027757\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://bugzilla.novell.com/show_bug.cgi?id=702034\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=715384\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/davidben/nspluginwrapper/commit/7e4ab8e1189846041f955e6c83f72bc1624e7a98\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
RHSA-2012:1459
Vulnerability from csaf_redhat - Published: 2012-11-13 14:00 - Updated: 2025-11-21 17:41nspluginwrapper before 1.4.4 does not properly provide access to NPNVprivateModeBool variable settings, which could prevent Firefox plugins from determining if they should run in Private Browsing mode and allow remote attackers to bypass intended access restrictions, as demonstrated using Flash.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated nspluginwrapper packages that fix one security issue and one bug\nare now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
"title": "Topic"
},
{
"category": "general",
"text": "nspluginwrapper is a utility which allows 32-bit plug-ins to run in a\n64-bit browser environment (a common example is Adobe\u0027s browser plug-in for\npresenting proprietary Flash files embedded in web pages). It includes the\nplug-in viewer and a tool for managing plug-in installations and updates.\n\nIt was not possible for plug-ins wrapped by nspluginwrapper to discover\nwhether the browser was running in Private Browsing mode. This flaw could\nlead to plug-ins wrapped by nspluginwrapper using normal mode while they\nwere expected to run in Private Browsing mode. (CVE-2011-2486)\n\nThis update also fixes the following bug:\n\n* When using the Adobe Reader web browser plug-in provided by the\nacroread-plugin package on a 64-bit system, opening Portable Document\nFormat (PDF) files in Firefox could cause the plug-in to crash and a black\nwindow to be displayed where the PDF should be. Firefox had to be restarted\nto resolve the issue. This update implements a workaround in\nnspluginwrapper to automatically handle the plug-in crash, so that users\nno longer have to keep restarting Firefox. (BZ#869554)\n\nAll users of nspluginwrapper are advised to upgrade to these updated\npackages, which upgrade nspluginwrapper to upstream version 1.4.4, and\ncorrect these issues. After installing the update, Firefox must be\nrestarted for the changes to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:1459",
"url": "https://access.redhat.com/errata/RHSA-2012:1459"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "715384",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=715384"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1459.json"
}
],
"title": "Red Hat Security Advisory: nspluginwrapper security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:41:36+00:00",
"generator": {
"date": "2025-11-21T17:41:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2012:1459",
"initial_release_date": "2012-11-13T14:00:00+00:00",
"revision_history": [
{
"date": "2012-11-13T14:00:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-11-13T14:06:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:41:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.3.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.3.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.3.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.3.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nspluginwrapper-0:1.4.4-1.el6_3.i686",
"product": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.i686",
"product_id": "nspluginwrapper-0:1.4.4-1.el6_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspluginwrapper@1.4.4-1.el6_3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"product": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"product_id": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspluginwrapper-debuginfo@1.4.4-1.el6_3?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"product": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"product_id": "nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspluginwrapper@1.4.4-1.el6_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"product": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"product_id": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspluginwrapper-debuginfo@1.4.4-1.el6_3?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nspluginwrapper-0:1.4.4-1.el6_3.src",
"product": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.src",
"product_id": "nspluginwrapper-0:1.4.4-1.el6_3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspluginwrapper@1.4.4-1.el6_3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"product": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"product_id": "nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspluginwrapper@1.4.4-1.el6_3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"product": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"product_id": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspluginwrapper-debuginfo@1.4.4-1.el6_3?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.i686",
"relates_to_product_reference": "6Client-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"relates_to_product_reference": "6Client-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.src",
"relates_to_product_reference": "6Client-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"relates_to_product_reference": "6Client-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"relates_to_product_reference": "6Client-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"relates_to_product_reference": "6Client-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"relates_to_product_reference": "6Client-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.src",
"relates_to_product_reference": "6ComputeNode-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.i686",
"relates_to_product_reference": "6Server-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"relates_to_product_reference": "6Server-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.src",
"relates_to_product_reference": "6Server-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"relates_to_product_reference": "6Server-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"relates_to_product_reference": "6Server-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"relates_to_product_reference": "6Server-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"relates_to_product_reference": "6Server-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.i686",
"relates_to_product_reference": "6Workstation-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"relates_to_product_reference": "6Workstation-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.src",
"relates_to_product_reference": "6Workstation-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"relates_to_product_reference": "6Workstation-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"relates_to_product_reference": "6Workstation-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"relates_to_product_reference": "6Workstation-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"relates_to_product_reference": "6Workstation-6.3.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-2486",
"discovery_date": "2011-05-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "715384"
}
],
"notes": [
{
"category": "description",
"text": "nspluginwrapper before 1.4.4 does not properly provide access to NPNVprivateModeBool variable settings, which could prevent Firefox plugins from determining if they should run in Private Browsing mode and allow remote attackers to bypass intended access restrictions, as demonstrated using Flash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nspluginwrapper: NPNVprivateModeBool variable not forwarded",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2486"
},
{
"category": "external",
"summary": "RHBZ#715384",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=715384"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2486",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2486"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2486",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2486"
}
],
"release_date": "2011-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-11-13T14:00:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:1459"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nspluginwrapper: NPNVprivateModeBool variable not forwarded"
}
]
}
RHSA-2012_1459
Vulnerability from csaf_redhat - Published: 2012-11-13 14:00 - Updated: 2024-11-22 05:54nspluginwrapper before 1.4.4 does not properly provide access to NPNVprivateModeBool variable settings, which could prevent Firefox plugins from determining if they should run in Private Browsing mode and allow remote attackers to bypass intended access restrictions, as demonstrated using Flash.
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated nspluginwrapper packages that fix one security issue and one bug\nare now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
"title": "Topic"
},
{
"category": "general",
"text": "nspluginwrapper is a utility which allows 32-bit plug-ins to run in a\n64-bit browser environment (a common example is Adobe\u0027s browser plug-in for\npresenting proprietary Flash files embedded in web pages). It includes the\nplug-in viewer and a tool for managing plug-in installations and updates.\n\nIt was not possible for plug-ins wrapped by nspluginwrapper to discover\nwhether the browser was running in Private Browsing mode. This flaw could\nlead to plug-ins wrapped by nspluginwrapper using normal mode while they\nwere expected to run in Private Browsing mode. (CVE-2011-2486)\n\nThis update also fixes the following bug:\n\n* When using the Adobe Reader web browser plug-in provided by the\nacroread-plugin package on a 64-bit system, opening Portable Document\nFormat (PDF) files in Firefox could cause the plug-in to crash and a black\nwindow to be displayed where the PDF should be. Firefox had to be restarted\nto resolve the issue. This update implements a workaround in\nnspluginwrapper to automatically handle the plug-in crash, so that users\nno longer have to keep restarting Firefox. (BZ#869554)\n\nAll users of nspluginwrapper are advised to upgrade to these updated\npackages, which upgrade nspluginwrapper to upstream version 1.4.4, and\ncorrect these issues. After installing the update, Firefox must be\nrestarted for the changes to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:1459",
"url": "https://access.redhat.com/errata/RHSA-2012:1459"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "715384",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=715384"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1459.json"
}
],
"title": "Red Hat Security Advisory: nspluginwrapper security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T05:54:49+00:00",
"generator": {
"date": "2024-11-22T05:54:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2012:1459",
"initial_release_date": "2012-11-13T14:00:00+00:00",
"revision_history": [
{
"date": "2012-11-13T14:00:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-11-13T14:06:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T05:54:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.3.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.3.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.3.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.3.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nspluginwrapper-0:1.4.4-1.el6_3.i686",
"product": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.i686",
"product_id": "nspluginwrapper-0:1.4.4-1.el6_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspluginwrapper@1.4.4-1.el6_3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"product": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"product_id": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspluginwrapper-debuginfo@1.4.4-1.el6_3?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"product": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"product_id": "nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspluginwrapper@1.4.4-1.el6_3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"product": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"product_id": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspluginwrapper-debuginfo@1.4.4-1.el6_3?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nspluginwrapper-0:1.4.4-1.el6_3.src",
"product": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.src",
"product_id": "nspluginwrapper-0:1.4.4-1.el6_3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspluginwrapper@1.4.4-1.el6_3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"product": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"product_id": "nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspluginwrapper@1.4.4-1.el6_3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"product": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"product_id": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspluginwrapper-debuginfo@1.4.4-1.el6_3?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.i686",
"relates_to_product_reference": "6Client-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"relates_to_product_reference": "6Client-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.src",
"relates_to_product_reference": "6Client-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"relates_to_product_reference": "6Client-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"relates_to_product_reference": "6Client-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"relates_to_product_reference": "6Client-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"relates_to_product_reference": "6Client-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.src",
"relates_to_product_reference": "6ComputeNode-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.i686",
"relates_to_product_reference": "6Server-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"relates_to_product_reference": "6Server-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.src",
"relates_to_product_reference": "6Server-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"relates_to_product_reference": "6Server-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"relates_to_product_reference": "6Server-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"relates_to_product_reference": "6Server-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"relates_to_product_reference": "6Server-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.i686",
"relates_to_product_reference": "6Workstation-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"relates_to_product_reference": "6Workstation-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.src",
"relates_to_product_reference": "6Workstation-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-0:1.4.4-1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64"
},
"product_reference": "nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"relates_to_product_reference": "6Workstation-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"relates_to_product_reference": "6Workstation-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"relates_to_product_reference": "6Workstation-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64"
},
"product_reference": "nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"relates_to_product_reference": "6Workstation-6.3.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-2486",
"discovery_date": "2011-05-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "715384"
}
],
"notes": [
{
"category": "description",
"text": "nspluginwrapper before 1.4.4 does not properly provide access to NPNVprivateModeBool variable settings, which could prevent Firefox plugins from determining if they should run in Private Browsing mode and allow remote attackers to bypass intended access restrictions, as demonstrated using Flash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nspluginwrapper: NPNVprivateModeBool variable not forwarded",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2486"
},
{
"category": "external",
"summary": "RHBZ#715384",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=715384"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2486",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2486"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2486",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2486"
}
],
"release_date": "2011-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-11-13T14:00:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:1459"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6Client-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6Client-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6ComputeNode-optional-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6ComputeNode-optional-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6Server-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6Server-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.i686",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.ppc",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.src",
"6Workstation-6.3.z:nspluginwrapper-0:1.4.4-1.el6_3.x86_64",
"6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.i686",
"6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.ppc",
"6Workstation-6.3.z:nspluginwrapper-debuginfo-0:1.4.4-1.el6_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nspluginwrapper: NPNVprivateModeBool variable not forwarded"
}
]
}
GSD-2011-2486
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2011-2486",
"description": "nspluginwrapper before 1.4.4 does not properly provide access to NPNVprivateModeBool variable settings, which could prevent Firefox plugins from determining if they should run in Private Browsing mode and allow remote attackers to bypass intended access restrictions, as demonstrated using Flash.",
"id": "GSD-2011-2486",
"references": [
"https://www.suse.com/security/cve/CVE-2011-2486.html",
"https://access.redhat.com/errata/RHSA-2012:1459",
"https://linux.oracle.com/cve/CVE-2011-2486.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-2486"
],
"details": "nspluginwrapper before 1.4.4 does not properly provide access to NPNVprivateModeBool variable settings, which could prevent Firefox plugins from determining if they should run in Private Browsing mode and allow remote attackers to bypass intended access restrictions, as demonstrated using Flash.",
"id": "GSD-2011-2486",
"modified": "2023-12-13T01:19:07.296328Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2486",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "nspluginwrapper before 1.4.4 does not properly provide access to NPNVprivateModeBool variable settings, which could prevent Firefox plugins from determining if they should run in Private Browsing mode and allow remote attackers to bypass intended access restrictions, as demonstrated using Flash."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lwn.net/Alerts/524725/",
"refsource": "MISC",
"url": "http://lwn.net/Alerts/524725/"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2012-1459.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1459.html"
},
{
"name": "http://www.securitytracker.com/id?1027757",
"refsource": "MISC",
"url": "http://www.securitytracker.com/id?1027757"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=702034",
"refsource": "MISC",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=702034"
},
{
"name": "https://github.com/davidben/nspluginwrapper/commit/7e4ab8e1189846041f955e6c83f72bc1624e7a98",
"refsource": "MISC",
"url": "https://github.com/davidben/nspluginwrapper/commit/7e4ab8e1189846041f955e6c83f72bc1624e7a98"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=715384",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=715384"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:nspluginwrapper:nspluginwrapper:1.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2486"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "nspluginwrapper before 1.4.4 does not properly provide access to NPNVprivateModeBool variable settings, which could prevent Firefox plugins from determining if they should run in Private Browsing mode and allow remote attackers to bypass intended access restrictions, as demonstrated using Flash."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=715384",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=715384"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=702034",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.novell.com/show_bug.cgi?id=702034"
},
{
"name": "RHSA-2012:1459",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1459.html"
},
{
"name": "1027757",
"refsource": "SECTRACK",
"tags": [
"Patch"
],
"url": "http://www.securitytracker.com/id?1027757"
},
{
"name": "http://lwn.net/Alerts/524725/",
"refsource": "MISC",
"tags": [],
"url": "http://lwn.net/Alerts/524725/"
},
{
"name": "https://github.com/davidben/nspluginwrapper/commit/7e4ab8e1189846041f955e6c83f72bc1624e7a98",
"refsource": "MISC",
"tags": [],
"url": "https://github.com/davidben/nspluginwrapper/commit/7e4ab8e1189846041f955e6c83f72bc1624e7a98"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2013-09-01T06:24Z",
"publishedDate": "2012-11-19T12:10Z"
}
}
}
FKIE_CVE-2011-2486
Vulnerability from fkie_nvd - Published: 2012-11-19 12:10 - Updated: 2025-04-11 00:51| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://lwn.net/Alerts/524725/ | ||
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2012-1459.html | ||
| secalert@redhat.com | http://www.securitytracker.com/id?1027757 | Patch | |
| secalert@redhat.com | https://bugzilla.novell.com/show_bug.cgi?id=702034 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=715384 | ||
| secalert@redhat.com | https://github.com/davidben/nspluginwrapper/commit/7e4ab8e1189846041f955e6c83f72bc1624e7a98 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lwn.net/Alerts/524725/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2012-1459.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1027757 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.novell.com/show_bug.cgi?id=702034 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=715384 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/davidben/nspluginwrapper/commit/7e4ab8e1189846041f955e6c83f72bc1624e7a98 |
| Vendor | Product | Version | |
|---|---|---|---|
| nspluginwrapper | nspluginwrapper | 1.4.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nspluginwrapper:nspluginwrapper:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "87E01B32-8F5C-4327-993B-7C43D1B45E7E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "nspluginwrapper before 1.4.4 does not properly provide access to NPNVprivateModeBool variable settings, which could prevent Firefox plugins from determining if they should run in Private Browsing mode and allow remote attackers to bypass intended access restrictions, as demonstrated using Flash."
},
{
"lang": "es",
"value": "nspluginwrapper antes de v1.4.4 no proporciona adecuadamente acceso a la variable de configuraci\u00f3n NPNVprivateModeBool, lo que podr\u00eda impedir a algunos plugins de Firefox a la hora de determinar si se deben ejecutar en el modo de navegaci\u00f3n privada y permitir de esta forma a atacantes remotos evitar las restricciones de acceso, tal y como se demostr\u00f3 con el uso inapropiado de Flash.\r\n"
}
],
"id": "CVE-2011-2486",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-11-19T12:10:48.917",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://lwn.net/Alerts/524725/"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1459.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.securitytracker.com/id?1027757"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=702034"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=715384"
},
{
"source": "secalert@redhat.com",
"url": "https://github.com/davidben/nspluginwrapper/commit/7e4ab8e1189846041f955e6c83f72bc1624e7a98"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lwn.net/Alerts/524725/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1459.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securitytracker.com/id?1027757"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=702034"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=715384"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/davidben/nspluginwrapper/commit/7e4ab8e1189846041f955e6c83f72bc1624e7a98"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
OPENSUSE-SU-2024:10270-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "nspluginwrapper-1.4.4-16.6 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the nspluginwrapper-1.4.4-16.6 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10270",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10270-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-2486 page",
"url": "https://www.suse.com/security/cve/CVE-2011-2486/"
}
],
"title": "nspluginwrapper-1.4.4-16.6 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10270-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "nspluginwrapper-1.4.4-16.6.aarch64",
"product": {
"name": "nspluginwrapper-1.4.4-16.6.aarch64",
"product_id": "nspluginwrapper-1.4.4-16.6.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nspluginwrapper-1.4.4-16.6.ppc64le",
"product": {
"name": "nspluginwrapper-1.4.4-16.6.ppc64le",
"product_id": "nspluginwrapper-1.4.4-16.6.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nspluginwrapper-1.4.4-16.6.s390x",
"product": {
"name": "nspluginwrapper-1.4.4-16.6.s390x",
"product_id": "nspluginwrapper-1.4.4-16.6.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nspluginwrapper-1.4.4-16.6.x86_64",
"product": {
"name": "nspluginwrapper-1.4.4-16.6.x86_64",
"product_id": "nspluginwrapper-1.4.4-16.6.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-1.4.4-16.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nspluginwrapper-1.4.4-16.6.aarch64"
},
"product_reference": "nspluginwrapper-1.4.4-16.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-1.4.4-16.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nspluginwrapper-1.4.4-16.6.ppc64le"
},
"product_reference": "nspluginwrapper-1.4.4-16.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-1.4.4-16.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nspluginwrapper-1.4.4-16.6.s390x"
},
"product_reference": "nspluginwrapper-1.4.4-16.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspluginwrapper-1.4.4-16.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nspluginwrapper-1.4.4-16.6.x86_64"
},
"product_reference": "nspluginwrapper-1.4.4-16.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-2486",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-2486"
}
],
"notes": [
{
"category": "general",
"text": "nspluginwrapper before 1.4.4 does not properly provide access to NPNVprivateModeBool variable settings, which could prevent Firefox plugins from determining if they should run in Private Browsing mode and allow remote attackers to bypass intended access restrictions, as demonstrated using Flash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:nspluginwrapper-1.4.4-16.6.aarch64",
"openSUSE Tumbleweed:nspluginwrapper-1.4.4-16.6.ppc64le",
"openSUSE Tumbleweed:nspluginwrapper-1.4.4-16.6.s390x",
"openSUSE Tumbleweed:nspluginwrapper-1.4.4-16.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-2486",
"url": "https://www.suse.com/security/cve/CVE-2011-2486"
},
{
"category": "external",
"summary": "SUSE Bug 702034 for CVE-2011-2486",
"url": "https://bugzilla.suse.com/702034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:nspluginwrapper-1.4.4-16.6.aarch64",
"openSUSE Tumbleweed:nspluginwrapper-1.4.4-16.6.ppc64le",
"openSUSE Tumbleweed:nspluginwrapper-1.4.4-16.6.s390x",
"openSUSE Tumbleweed:nspluginwrapper-1.4.4-16.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-2486"
}
]
}
GHSA-FVM8-V4J9-JGP3
Vulnerability from github – Published: 2022-05-17 05:05 – Updated: 2025-04-11 04:04nspluginwrapper before 1.4.4 does not properly provide access to NPNVprivateModeBool variable settings, which could prevent Firefox plugins from determining if they should run in Private Browsing mode and allow remote attackers to bypass intended access restrictions, as demonstrated using Flash.
{
"affected": [],
"aliases": [
"CVE-2011-2486"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2012-11-19T12:10:00Z",
"severity": "MODERATE"
},
"details": "nspluginwrapper before 1.4.4 does not properly provide access to NPNVprivateModeBool variable settings, which could prevent Firefox plugins from determining if they should run in Private Browsing mode and allow remote attackers to bypass intended access restrictions, as demonstrated using Flash.",
"id": "GHSA-fvm8-v4j9-jgp3",
"modified": "2025-04-11T04:04:58Z",
"published": "2022-05-17T05:05:39Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2486"
},
{
"type": "WEB",
"url": "https://github.com/davidben/nspluginwrapper/commit/7e4ab8e1189846041f955e6c83f72bc1624e7a98"
},
{
"type": "WEB",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=702034"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=715384"
},
{
"type": "WEB",
"url": "http://lwn.net/Alerts/524725"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1459.html"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1027757"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.