Directory traversal vulnerability in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8, when using "flat" addons, allows remote attackers to read arbitrary Javascript, image, and stylesheet files via the chrome: URI scheme, as demonstrated by stealing session information from sessionstore.js.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1484-1 | New xulrunner packages fix several vulnerabilities |
Debian DSA |
DSA-1485-1 | New icedove packages fix several vulnerabilities |
Debian DSA |
DSA-1485-2 | New icedove packages fix regression |
Debian DSA |
DSA-1489-1 | New iceweasel packages fix several vulnerabilities |
Debian DSA |
DSA-1506-1 | New iceape packages fix several vulnerabilities |
Debian DSA |
DSA-1506-2 | New iceape packages fix regression |
Ubuntu USN |
USN-576-1 | Firefox vulnerabilities |
Ubuntu USN |
USN-582-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T07:46:54.336Z
Reserved: 2008-01-23T00:00:00
Link: CVE-2008-0418
No data.
Status : Deferred
Published: 2008-02-08T22:00:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-0418
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN