{
  "threat_severity" : "Moderate",
  "public_date" : "2012-08-28T00:00:00Z",
  "bugzilla" : {
    "description" : "Mozilla: Incorrect site SSL certificate data display (MFSA 2012-69)",
    "id" : "851931",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=851931"
  },
  "cvss" : {
    "cvss_base_score" : "4.3",
    "cvss_scoring_vector" : "AV:N/AC:M/Au:N/C:P/I:N/A:N",
    "status" : "verified"
  },
  "details" : [ "Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly handle onLocationChange events during navigation between different https sites, which allows remote attackers to spoof the X.509 certificate information in the address bar via a crafted web page." ],
  "acknowledgement" : "Red Hat would like to thank Mozilla project for reporting this issue. Upstream acknowledges Mark Poticha as the original reporter.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2012-08-29T00:00:00Z",
    "advisory" : "RHSA-2012:1210",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "firefox-0:10.0.7-1.el5_8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2012-08-29T00:00:00Z",
    "advisory" : "RHSA-2012:1210",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "xulrunner-0:10.0.7-2.el5_8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2012-08-29T00:00:00Z",
    "advisory" : "RHSA-2012:1210",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "firefox-0:10.0.7-1.el6_3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2012-08-29T00:00:00Z",
    "advisory" : "RHSA-2012:1210",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "xulrunner-0:10.0.7-1.el6_3"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2012-3976\nhttps://nvd.nist.gov/vuln/detail/CVE-2012-3976" ],
  "name" : "CVE-2012-3976",
  "csaw" : false
}