{
  "threat_severity" : "Critical",
  "public_date" : "2011-08-16T00:00:00Z",
  "bugzilla" : {
    "description" : "Mozilla: Private data leakage using RegExp.input",
    "id" : "730523",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=730523"
  },
  "cvss" : {
    "cvss_base_score" : "6.8",
    "cvss_scoring_vector" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
    "status" : "verified"
  },
  "details" : [ "Mozilla Firefox before 3.6.20, Thunderbird 2.x and 3.x before 3.1.12, SeaMonkey 1.x and 2.x, and possibly other products does not properly handle the RegExp.input property, which allows remote attackers to bypass the Same Origin Policy and read data from a different domain via a crafted web site, possibly related to a use-after-free." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 4",
    "release_date" : "2011-08-16T00:00:00Z",
    "advisory" : "RHSA-2011:1164",
    "cpe" : "cpe:/o:redhat:enterprise_linux:4",
    "package" : "firefox-0:3.6.20-2.el4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 4",
    "release_date" : "2011-08-16T00:00:00Z",
    "advisory" : "RHSA-2011:1165",
    "cpe" : "cpe:/o:redhat:enterprise_linux:4",
    "package" : "thunderbird-0:1.5.0.12-40.el4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 4",
    "release_date" : "2011-08-16T00:00:00Z",
    "advisory" : "RHSA-2011:1167",
    "cpe" : "cpe:/o:redhat:enterprise_linux:4",
    "package" : "seamonkey-0:1.0.9-72.el4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2011-08-16T00:00:00Z",
    "advisory" : "RHSA-2011:1164",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "firefox-0:3.6.20-2.el5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2011-08-16T00:00:00Z",
    "advisory" : "RHSA-2011:1164",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "xulrunner-0:1.9.2.20-2.el5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2011-08-16T00:00:00Z",
    "advisory" : "RHSA-2011:1165",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "thunderbird-0:2.0.0.24-21.el5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2011-08-16T00:00:00Z",
    "advisory" : "RHSA-2011:1164",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "firefox-0:3.6.20-2.el6_1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2011-08-16T00:00:00Z",
    "advisory" : "RHSA-2011:1164",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "xulrunner-0:1.9.2.20-2.el6_1"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux Extended Update Support 5.7",
    "fix_state" : "Affected",
    "package_name" : "firefox",
    "cpe" : "cpe:/o:redhat:rhel_eus:5.7"
  }, {
    "product_name" : "Red Hat Enterprise Linux Extended Update Support 5.7",
    "fix_state" : "Affected",
    "package_name" : "thunderbird",
    "cpe" : "cpe:/o:redhat:rhel_eus:5.7"
  }, {
    "product_name" : "Red Hat Enterprise Linux Extended Update Support 6.1",
    "fix_state" : "Affected",
    "package_name" : "firefox",
    "cpe" : "cpe:/o:redhat:rhel_eus:6.1"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2011-2983\nhttps://nvd.nist.gov/vuln/detail/CVE-2011-2983" ],
  "name" : "CVE-2011-2983",
  "csaw" : false
}