4.3
CVSSv2

CVE-2008-4582

Published: 15/10/2008 Updated: 30/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Mozilla Firefox 3.0.1 up to and including 3.0.3, Firefox 2.x prior to 2.0.0.18, and SeaMonkey 1.x prior to 1.1.13, when running on Windows, do not properly identify the context of Windows .url shortcut files, which allows user-assisted remote malicious users to bypass the Same Origin Policy and obtain sensitive information via an HTML document that is directly accessible through a filesystem, as demonstrated by documents in (1) local folders, (2) Windows share folders, and (3) RAR archives, and as demonstrated by IFRAMEs referencing shortcuts that point to (a) about:cache?device=memory and (b) about:cache?device=disk, a variant of CVE-2008-2810.

Vulnerable Product Search on Vulmon Subscribe to Product

debian debian linux 4.0

mozilla firefox 3.0.2

mozilla firefox 3.0.1

mozilla firefox 3.0.3

mozilla firefox 2.0.0.14

mozilla firefox 2.0.0.15

mozilla firefox 2.0.0.12

mozilla firefox 2.0.0.13

mozilla firefox 2.0

mozilla firefox 2.0.0.1

mozilla firefox 2.0.0.16

mozilla firefox 2.0.0.17

mozilla firefox 2.0.0.10

mozilla firefox 2.0.0.11

canonical ubuntu linux 8.04

canonical ubuntu linux 6.06

canonical ubuntu linux 8.10

canonical ubuntu linux 7.10

mozilla seamonkey 1.0.5

mozilla seamonkey 1.0.4

mozilla seamonkey 1.1

mozilla seamonkey 1.1.1

mozilla seamonkey 1.1.9

mozilla seamonkey 1.0.8

mozilla seamonkey 1.0.7

mozilla seamonkey 1.0.6

mozilla seamonkey 1.0

mozilla seamonkey 1.1.4

mozilla seamonkey 1.1.3

mozilla seamonkey 1.1.2

mozilla seamonkey 1.0.3

mozilla seamonkey 1.0.2

mozilla seamonkey 1.1.10

mozilla seamonkey 1.1.11

mozilla seamonkey 1.1.8

mozilla seamonkey 1.1.7

mozilla seamonkey 1.0.9

mozilla seamonkey 1.0.1

mozilla seamonkey 1.1.12

mozilla seamonkey 1.1.6

mozilla seamonkey 1.1.5

Vendor Advisories

Liu Die Yu discovered an information disclosure vulnerability in Firefox when using saved url shortcut files If a user were tricked into downloading a crafted url file and a crafted HTML file, an attacker could steal information from the user’s cache (CVE-2008-4582) ...
Several remote vulnerabilities have been discovered in the Iceweasel webbrowser, an unbranded version of the Firefox browser The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-0017 Justin Schuh discovered that a buffer overflow in the http-index-format parser could lead to arbitrary code execution ...
Several remote vulnerabilities have been discovered in Iceape an unbranded version of the Seamonkey internet suite The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-0016 Justin Schuh, Tom Cross and Peter Williams discovered a buffer overflow in the parser for UTF-8 URLs, which may lead to the ex ...
Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-0016 Justin Schuh, Tom Cross and Peter Williams discovered a buffer overflow in the parser for UTF-8 URLs, which may lead to the executio ...
Mozilla Foundation Security Advisory 2008-47 Information stealing via local shortcut files Announced November 12, 2008 Reporter Liu Die Yu Impact Moderate Products Firefox, SeaMonkey Fixed in ...

Exploits

source: wwwsecurityfocuscom/bid/31611/info Mozilla Firefox is prone to a vulnerability that allows attackers to violate the same-origin policy This issue occurs because the application fails to properly enforce the same-origin policy when handling internet shortcut files An attacker may create a malicious webpage that can access the pr ...

References

CWE-264http://secunia.com/advisories/32192http://liudieyu0.blog124.fc2.com/blog-entry-6.htmlhttp://www.securityfocus.com/bid/31747https://bugzilla.mozilla.org/show_bug.cgi?id=455311http://www.mozilla.org/security/announce/2008/mfsa2008-47.htmlhttp://secunia.com/advisories/32721https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.htmlhttp://www.us-cert.gov/cas/techalerts/TA08-319A.htmlhttp://secunia.com/advisories/32845http://www.debian.org/security/2008/dsa-1669http://secunia.com/advisories/32693http://secunia.com/advisories/32714http://www.debian.org/security/2008/dsa-1671http://www.securityfocus.com/bid/31611http://securitytracker.com/alerts/2008/Nov/1021212.htmlhttp://secunia.com/advisories/33433http://www.debian.org/security/2009/dsa-1697http://securityreason.com/securityalert/4416http://www.debian.org/security/2009/dsa-1696http://secunia.com/advisories/33434http://secunia.com/advisories/34501http://www.vupen.com/english/advisories/2009/0977http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1http://www.securitytracker.com/id?1021190http://www.vupen.com/english/advisories/2008/2818http://secunia.com/advisories/32684http://ubuntu.com/usn/usn-667-1http://secunia.com/advisories/32853https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.htmlhttp://secunia.com/advisories/32778https://exchange.xforce.ibmcloud.com/vulnerabilities/45740http://www.securityfocus.com/archive/1/497091/100/0/threadedhttps://usn.ubuntu.com/667-1/https://nvd.nist.govhttps://www.exploit-db.com/exploits/32466/