SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   Mozilla Firefox Vendors:   Mozilla.org
Mozilla Firefox '.desktop' Files May Let Remote Users Execute Arbitrary Code with Chrome Privileges
SecurityTracker Alert ID:  1021666
SecurityTracker URL:  http://securitytracker.com/id/1021666
CVE Reference:   CVE-2009-0356   (Links to External Site)
Updated:  Feb 4 2009
Original Entry Date:  Feb 4 2009
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 3.0.5 and prior versions
Description:   A vulnerability was reported in Mozilla Firefox. A remote user may be able to cause arbitrary scripting code to be executed with chrome privileges in certain cases.

A remote user can create a specially crafted '.desktop' shortcut file and specially crafted HTML that, when downloaded by the target user, will be able to load a privileged chrome document, inject arbitrary code into the document, and execute the document with chrome privileges.

Mozilla SeaMonkey is affected.

Georgi Guninski reported this variation of a vulnerability reported earlier by Liu Die Yu.

Impact:   A remote user may be able to cause arbitrary scripting code to be executed with chrome privileges in certain cases.
Solution:   The vendor has issued a fix (3.0.6).

The vendor's advisory is available at:

http://www.mozilla.org/security/announce/2009/mfsa2009-04.html

Vendor URL:  www.mozilla.org/security/announce/2009/mfsa2009-04.html (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Feb 4 2009 (Red Hat Issues Fix) Mozilla Firefox '.desktop' Files May Let Remote Users Execute Arbitrary Code with Chrome Privileges
Red Hat has released a fix for Red Hat Enterprise Linux 4 and 5.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC