fkie_cve-2008-0418
Vulnerability from fkie_nvd
Published
2008-02-08 22:00
Modified
2025-04-09 00:30
Severity ?
Summary
Directory traversal vulnerability in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8, when using "flat" addons, allows remote attackers to read arbitrary Javascript, image, and stylesheet files via the chrome: URI scheme, as demonstrated by stealing session information from sessionstore.js.
References
secalert@redhat.comhttp://browser.netscape.com/releasenotes/
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html
secalert@redhat.comhttp://secunia.com/advisories/28622/
secalert@redhat.comhttp://secunia.com/advisories/28754
secalert@redhat.comhttp://secunia.com/advisories/28766
secalert@redhat.comhttp://secunia.com/advisories/28808
secalert@redhat.comhttp://secunia.com/advisories/28815
secalert@redhat.comhttp://secunia.com/advisories/28818
secalert@redhat.comhttp://secunia.com/advisories/28839
secalert@redhat.comhttp://secunia.com/advisories/28864
secalert@redhat.comhttp://secunia.com/advisories/28865
secalert@redhat.comhttp://secunia.com/advisories/28877
secalert@redhat.comhttp://secunia.com/advisories/28879
secalert@redhat.comhttp://secunia.com/advisories/28924
secalert@redhat.comhttp://secunia.com/advisories/28939
secalert@redhat.comhttp://secunia.com/advisories/28958
secalert@redhat.comhttp://secunia.com/advisories/29049
secalert@redhat.comhttp://secunia.com/advisories/29086
secalert@redhat.comhttp://secunia.com/advisories/29098
secalert@redhat.comhttp://secunia.com/advisories/29164
secalert@redhat.comhttp://secunia.com/advisories/29167
secalert@redhat.comhttp://secunia.com/advisories/29211
secalert@redhat.comhttp://secunia.com/advisories/29567
secalert@redhat.comhttp://secunia.com/advisories/30327
secalert@redhat.comhttp://secunia.com/advisories/30620
secalert@redhat.comhttp://secunia.com/advisories/31043
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.445399
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1
secalert@redhat.comhttp://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html
secalert@redhat.comhttp://wiki.rpath.com/Advisories:rPSA-2008-0051
secalert@redhat.comhttp://wiki.rpath.com/Advisories:rPSA-2008-0093
secalert@redhat.comhttp://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093
secalert@redhat.comhttp://www.debian.org/security/2008/dsa-1484
secalert@redhat.comhttp://www.debian.org/security/2008/dsa-1485
secalert@redhat.comhttp://www.debian.org/security/2008/dsa-1489
secalert@redhat.comhttp://www.debian.org/security/2008/dsa-1506
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200805-18.xml
secalert@redhat.comhttp://www.hiredhacker.com/2008/01/19/firefox-chrome-url-handling-directory-traversal/
secalert@redhat.comhttp://www.kb.cert.org/vuls/id/309608US Government Resource
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:048
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:062
secalert@redhat.comhttp://www.mozilla.org/security/announce/2008/mfsa2008-05.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2008-0103.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2008-0104.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2008-0105.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/487826/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/488002/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/488971/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/27406
secalert@redhat.comhttp://www.securitytracker.com/id?1019329
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-576-1
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-582-1
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-582-2
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/0263
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/0453/references
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/0454/references
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/0627/references
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/1793/references
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/2091/references
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-1995
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10705
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html
af854a3a-2127-422b-91ae-364da2661108http://browser.netscape.com/releasenotes/
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28622/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28754
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28766
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28808
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28815
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28818
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28839
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28864
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28865
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28877
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28879
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28924
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28939
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28958
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29049
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29086
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29098
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29164
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29167
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29211
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29567
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30327
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30620
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31043
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.445399
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1
af854a3a-2127-422b-91ae-364da2661108http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/Advisories:rPSA-2008-0051
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/Advisories:rPSA-2008-0093
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1484
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1485
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1489
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1506
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml
af854a3a-2127-422b-91ae-364da2661108http://www.hiredhacker.com/2008/01/19/firefox-chrome-url-handling-directory-traversal/
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/309608US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:048
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:062
af854a3a-2127-422b-91ae-364da2661108http://www.mozilla.org/security/announce/2008/mfsa2008-05.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0103.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0104.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0105.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/487826/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/488002/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/488971/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/27406
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1019329
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-576-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-582-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-582-2
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0263
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0453/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0454/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0627/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1793/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2091/references
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1995
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10705
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html
Impacted products
Vendor Product Version
mozilla firefox *
mozilla seamonkey *
mozilla thunderbird *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3E4F934-1CC7-475C-B425-BEEF29AED912",
              "versionEndIncluding": "2.0.0.11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBB527B8-3829-4C2E-8A46-F4D4EA5C5060",
              "versionEndIncluding": "1.1.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25E3F549-B010-49E4-B8F6-B22727D57AA6",
              "versionEndIncluding": "2.0.0.11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8, when using \"flat\" addons, allows remote attackers to read arbitrary Javascript, image, and stylesheet files via the chrome: URI scheme, as demonstrated by stealing session information from sessionstore.js."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de salto de directorio en Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, y SeaMonkey en versiones anteriores a 1.1.8, cuando usa addons \"llanos\", permite a atacantes remotos leer Javascript, im\u00e1genes, y ficheros de hojas de estilo de su elecci\u00f3n a trav\u00e9s de chrome: URI scheme, tal y como se demostr\u00f3 robando informaci\u00f3n de la sesi\u00f3n de sessionstore.js."
    }
  ],
  "id": "CVE-2008-0418",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-02-08T22:00:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://browser.netscape.com/releasenotes/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/28622/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/28754"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/28766"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/28808"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/28815"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/28818"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/28839"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/28864"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/28865"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/28877"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/28879"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/28924"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/28939"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/28958"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29049"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29086"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29098"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29164"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29167"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29211"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/29567"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30327"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/30620"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/31043"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.445399"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0051"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0093"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2008/dsa-1484"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2008/dsa-1485"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2008/dsa-1489"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2008/dsa-1506"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.hiredhacker.com/2008/01/19/firefox-chrome-url-handling-directory-traversal/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/309608"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:048"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:062"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-05.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0103.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0104.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0105.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/487826/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/488002/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/488971/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/27406"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1019329"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/usn-576-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/usn-582-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/usn-582-2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/0263"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/0453/references"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/0454/references"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/0627/references"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/1793/references"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/2091/references"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://issues.rpath.com/browse/RPL-1995"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10705"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://browser.netscape.com/releasenotes/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28622/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28754"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28766"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28808"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28815"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28818"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28839"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28864"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28865"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28877"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28879"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28924"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28939"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28958"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29049"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29086"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29098"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29164"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29167"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29211"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29567"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30327"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30620"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31043"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.445399"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0051"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0093"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1484"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1485"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1489"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1506"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.hiredhacker.com/2008/01/19/firefox-chrome-url-handling-directory-traversal/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/309608"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:048"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:062"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-05.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0103.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0104.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0105.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/487826/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/488002/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/488971/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/27406"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019329"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-576-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-582-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-582-2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0263"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0453/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0454/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0627/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1793/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2091/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-1995"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10705"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…