5
CVSSv2

CVE-2008-5012

Published: 13/11/2008 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Mozilla Firefox 2.x prior to 2.0.0.18, Thunderbird 2.x prior to 2.0.0.18, and SeaMonkey 1.x prior to 1.1.13 do not properly change the source URI when processing a canvas element and an HTTP redirect, which allows remote malicious users to bypass the same origin policy and access arbitrary images that are not directly accessible to the attacker. NOTE: this issue can be leveraged to enumerate software on the client by performing redirections related to moz-icon.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla seamonkey 1.1.10

mozilla thunderbird 1.5.0.7

mozilla firefox 0.9_rc

mozilla thunderbird 0.6

mozilla seamonkey 1.0.3

mozilla firefox 0.8

mozilla firefox 2.0.0.12

mozilla thunderbird 0.7.2

mozilla firefox 1.5

mozilla thunderbird 2.0.0.4

mozilla seamonkey 1.1.8

mozilla firefox 1.5.2

mozilla seamonkey 1.0.1

mozilla seamonkey 1.1.7

mozilla seamonkey 1.0.6

mozilla firefox 1.5.0.6

mozilla firefox 1.8

mozilla seamonkey 1.0.9

mozilla thunderbird 0.3

mozilla seamonkey 1.1.3

mozilla firefox 2.0.0.2

mozilla firefox 1.5.0.10

mozilla firefox 1.5.0.3

mozilla thunderbird 0.2

mozilla seamonkey 1.0

mozilla thunderbird 1.0.7

mozilla firefox 1.5.0.11

mozilla seamonkey 1.0.99

mozilla firefox 1.5.4

mozilla seamonkey 1.1.5

mozilla seamonkey 1.0.7

mozilla firefox 1.0.2

mozilla seamonkey

mozilla thunderbird 2.0.0.15

mozilla thunderbird 2.0.0.16

mozilla thunderbird 1.7.1

mozilla thunderbird 1.5.0.3

mozilla firefox 0.9.1

mozilla thunderbird 1.5.0.10

mozilla firefox 1.0.4

mozilla firefox 2.0.0.7

mozilla firefox 1.0.7

mozilla thunderbird 1.5.0.6

mozilla seamonkey 1.1

mozilla firefox 2.0.0.9

mozilla firefox 0.10.1

mozilla thunderbird 1.0

mozilla thunderbird 2.0.0.3

mozilla firefox 0.9

mozilla thunderbird 1.0.1

mozilla firefox 2.0.0.16

mozilla thunderbird 1.5

mozilla firefox 1.5.6

mozilla thunderbird 2.0.0.2

mozilla seamonkey 1.1.2

mozilla firefox 2.0.0.15

mozilla seamonkey 1.0.2

mozilla seamonkey 1.0.8

mozilla thunderbird 1.0.2

mozilla thunderbird 2.0.0.0

mozilla seamonkey 1.1.11

mozilla firefox 1.0

mozilla seamonkey 1.1.1

mozilla firefox 1.5.0.7

mozilla thunderbird 2.0.0.12

mozilla firefox 2.0

mozilla firefox 1.0.1

mozilla thunderbird 1.5.0.2

mozilla firefox 2.0.0.14

mozilla thunderbird 2.0.0.13

mozilla seamonkey 1.0.5

mozilla thunderbird 1.5.0.8

mozilla thunderbird 2.0.0.14

mozilla firefox 1.5.0.8

mozilla firefox 1.0.6

mozilla thunderbird 0.5

mozilla thunderbird 1.0.4

mozilla firefox 2.0.0.3

mozilla thunderbird 1.5.2

mozilla firefox 1.5.0.9

mozilla firefox 1.5.0.5

mozilla firefox 1.5.7

mozilla firefox 1.5.0.12

mozilla thunderbird 1.5.0.9

mozilla thunderbird 1.5.0.11

mozilla thunderbird 0.9

mozilla thunderbird 1.0.3

mozilla firefox 2.0.0.6

mozilla seamonkey 1.1.6

mozilla thunderbird 2.0.0.11

mozilla firefox 2.0.0.11

mozilla firefox 1.5.0.2

mozilla firefox 1.0.3

mozilla firefox 2.0.0.4

mozilla firefox 1.5.1

mozilla thunderbird 0.7.3

mozilla firefox 0.9.3

mozilla firefox 2.0.0.13

mozilla thunderbird 0.4

mozilla thunderbird 1.5.1

mozilla thunderbird 0.7

mozilla firefox 2.0.0.1

mozilla thunderbird 1.0.6

mozilla thunderbird 1.0.5

mozilla thunderbird 1.7.3

mozilla seamonkey 1.0.4

mozilla firefox 1.5.5

mozilla firefox 0.9.2

mozilla thunderbird 2.0.0.1

mozilla seamonkey 1.1.9

mozilla thunderbird 1.5.0.1

mozilla firefox 2.0.0.8

mozilla firefox

mozilla thunderbird 1.0.8

mozilla thunderbird 0.1

mozilla firefox 1.5.8

mozilla thunderbird

mozilla firefox 1.5.3

mozilla thunderbird 0.7.1

mozilla thunderbird 0.8

mozilla firefox 1.5.0.4

mozilla firefox 1.5.0.1

mozilla firefox 0.10

mozilla firefox 1.0.5

mozilla firefox 2.0.0.5

mozilla firefox 2.0.0.10

mozilla thunderbird 1.5.0.4

mozilla seamonkey 1.1.4

mozilla firefox 1.0.8

Vendor Advisories

Synopsis Moderate: thunderbird security update Type/Severity Security Advisory: Moderate Topic Updated thunderbird packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 4 and 5This update has been rated as having moderate security impact by the RedHat Security Response Tea ...
Synopsis Critical: seamonkey security update Type/Severity Security Advisory: Critical Topic Updated seamonkey packages that fix security issues are now available forRed Hat Enterprise Linux 21, Red Hat Enterprise Linux 3 and Red HatEnterprise Linux 4This update has been rated as having critical security ...
Georgi Guninski, Michal Zalewsk and Chris Evans discovered that the same-origin check in Thunderbird could be bypassed If a user were tricked into opening a malicious website, an attacker could obtain private information from data stored in the images, or discover information about software on the user’s computer (CVE-2008-5012) ...
Liu Die Yu discovered an information disclosure vulnerability in Firefox when using saved url shortcut files If a user were tricked into downloading a crafted url file and a crafted HTML file, an attacker could steal information from the user’s cache (CVE-2008-4582) ...
Several remote vulnerabilities have been discovered in the Iceweasel webbrowser, an unbranded version of the Firefox browser The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-0017 Justin Schuh discovered that a buffer overflow in the http-index-format parser could lead to arbitrary code execution ...
Several remote vulnerabilities have been discovered in Iceape an unbranded version of the Seamonkey internet suite The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-0016 Justin Schuh, Tom Cross and Peter Williams discovered a buffer overflow in the parser for UTF-8 URLs, which may lead to the ex ...
Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-0016 Justin Schuh, Tom Cross and Peter Williams discovered a buffer overflow in the parser for UTF-8 URLs, which may lead to the executio ...
Mozilla Foundation Security Advisory 2008-48 Image stealing via canvas and HTTP redirect Announced November 12, 2008 Reporter Georgi Guninski, Michal Zalewski, Chris Evans Impact High Products Firefox, SeaMonkey, Thunderbird ...

References

CWE-200https://bugzilla.mozilla.org/show_bug.cgi?id=355126https://bugzilla.mozilla.org/show_bug.cgi?id=451619http://www.mozilla.org/security/announce/2008/mfsa2008-48.htmlhttp://www.securityfocus.com/bid/32281http://www.mandriva.com/security/advisories?name=MDVSA-2008:228http://www.securityfocus.com/bid/32351http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.htmlhttp://www.us-cert.gov/cas/techalerts/TA08-319A.htmlhttp://scarybeastsecurity.blogspot.com/2008/11/firefox-cross-domain-image-theft-and.htmlhttp://www.securityfocus.com/archive/1/498468http://scary.beasts.org/security/CESA-2008-009.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:235http://secunia.com/advisories/32845http://www.debian.org/security/2008/dsa-1669http://secunia.com/advisories/32714http://secunia.com/advisories/32694http://www.redhat.com/support/errata/RHSA-2008-0977.htmlhttp://secunia.com/advisories/32715http://secunia.com/advisories/32693http://www.debian.org/security/2008/dsa-1671http://www.debian.org/security/2009/dsa-1697http://secunia.com/advisories/33433http://secunia.com/advisories/33434http://www.debian.org/security/2009/dsa-1696http://www.vupen.com/english/advisories/2009/0977http://secunia.com/advisories/34501http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1http://www.securitytracker.com/id?1021187http://www.vupen.com/english/advisories/2008/3146http://secunia.com/advisories/32798http://secunia.com/advisories/32684http://ubuntu.com/usn/usn-667-1http://secunia.com/advisories/32853http://www.redhat.com/support/errata/RHSA-2008-0976.htmlhttps://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.htmlhttp://secunia.com/advisories/32778https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10750https://access.redhat.com/errata/RHSA-2008:0976https://nvd.nist.govhttps://usn.ubuntu.com/668-1/