National Cyber Awareness System
Vulnerability Summary for CVE-2009-4100
Original release date:11/29/2009
Yoono extension before 6.1.1 for Firefox performs certain operations with chrome privileges, which allows user-assisted remote attackers to execute arbitrary commands and perform cross-domain scripting attacks via DOM event handlers such as onload.
CVSS Severity (version 2.0):
CVSS Version 2 Metrics:
Access Vector: Network exploitable; Victim must voluntarily interact with attack mechanism
Access Complexity: Medium
Authentication: Not required to exploit
Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service
Per info from the following advisory:
Raised the score to CIA:complete
NVD received information from Yoono development team on December 4, 2009 that the affected versions are in fact 6.1.0 and previous. NVD adjusted affected versions accordingly because of this new information.
NVD received information from Yoono development team on December 4, 2009 that the fixed version is in fact 6.1.1. A patch can be found at the following URL:
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to firstname.lastname@example.org.
External Source: CONFIRM
External Source: XF
External Source: VUPEN
External Source: BID
External Source: MISC
External Source: SECUNIA