4.3
CVSSv2

CVE-2009-1835

Published: 12/06/2009 Updated: 30/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Mozilla Firefox prior to 3.0.11 and SeaMonkey prior to 1.1.17 associate local documents with external domain names located after the file:// substring in a URL, which allows user-assisted remote malicious users to read arbitrary cookies via a crafted HTML document, as demonstrated by a URL with file://example.com/C:/ at the beginning.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox 3.0.3

mozilla firefox 3.0.4

mozilla firefox 3.0.9

mozilla seamonkey 1.0

mozilla seamonkey 1.0.1

mozilla seamonkey 1.1.11

mozilla seamonkey 1.1.12

mozilla seamonkey 1.1

mozilla seamonkey 1.1.5

mozilla firefox 0.10

mozilla firefox 3.0.1

mozilla firefox 3.0.2

mozilla firefox 3.0

mozilla seamonkey 1.0.9

mozilla seamonkey 1.1.10

mozilla firefox 3.0.7

mozilla firefox 3.0.8

mozilla seamonkey 1.0.6

mozilla seamonkey 1.0.8

mozilla seamonkey 1.1.1

mozilla seamonkey 1.1.3

mozilla seamonkey 1.1.7

mozilla firefox 0.4

mozilla firefox 0.5

mozilla firefox 0.9.1

mozilla firefox 0.9

mozilla firefox 0.9.3

mozilla firefox 1.0.3

mozilla firefox 1.0.2

mozilla firefox 1.0.8

mozilla firefox 2.0_.1

mozilla firefox 2.0.0.21

mozilla firefox 2.0.0.10

mozilla firefox 0.7.1

mozilla firefox 1.0

mozilla firefox 2.0.0.7

mozilla firefox 1.5.0.1

mozilla firefox 1.5.0.6

mozilla firefox 1.5.0.7

mozilla firefox 1.5.6

mozilla firefox 1.5.5

mozilla firefox 2.0.0.1

mozilla firefox 2.0

mozilla firefox

mozilla firefox 0.10.1

mozilla firefox 2.0.0.14

mozilla firefox 2.0.0.12

mozilla firefox 1.0.1

mozilla firefox 1.0.7

mozilla firefox 1.0.6

mozilla firefox 2.0_.5

mozilla firefox 2.0_.6

mozilla firefox 2.0.0.16

mozilla firefox 1.4.1

mozilla firefox 1.5.0.2

mozilla firefox 1.5.0.3

mozilla firefox 1.5.4

mozilla firefox 1.5.1

mozilla firefox 1.8

mozilla firefox 2.0.0.4

mozilla firefox 0.9_rc

mozilla firefox 2.0.0.13

mozilla firefox 1.5

mozilla seamonkey 1.0.99

mozilla seamonkey 1.1.6

mozilla seamonkey 1.1.9

mozilla seamonkey

mozilla firefox 0.1

mozilla firefox 0.6

mozilla firefox 0.6.1

mozilla firefox 0.9.2

mozilla firefox 1.0.5

mozilla firefox 1.0.4

mozilla firefox 2.0_.10

mozilla firefox 2.0_.4

mozilla firefox 2.0.0.17

mozilla firefox 2.0.0.11

mozilla firefox 1.5.0.4

mozilla firefox 1.5.0.5

mozilla firefox 1.5.0.10

mozilla firefox 1.5.3

mozilla firefox 2.0.0.6

mozilla firefox 2.0.0.5

mozilla firefox 2.0.0.8

mozilla firefox 3.0.5

mozilla firefox 3.0.6

mozilla seamonkey 1.0.3

mozilla seamonkey 1.0.4

mozilla seamonkey 1.1.13

mozilla seamonkey 1.1.15

mozilla seamonkey 1.1.8

mozilla firefox 0.2

mozilla firefox 0.3

mozilla firefox 2.0.0.19

mozilla firefox 0.8

mozilla firefox 2.0.0.20

mozilla firefox 2.0.0.9

mozilla firefox 2.0_.7

mozilla firefox 2.0_.9

mozilla firefox 2.0_8

mozilla firefox 2.0.0.15

mozilla firefox 0.7

mozilla firefox 1.5.0.11

mozilla firefox 1.5.0.12

mozilla firefox 1.5.2

mozilla firefox 1.5.0.8

mozilla firefox 1.5.0.9

mozilla firefox 1.5.8

mozilla firefox 1.5.7

mozilla firefox 2.0.0.3

mozilla firefox 2.0.0.2

mozilla firefox 2.0.0.18

Vendor Advisories

Several flaws were discovered in the browser and JavaScript engines of Firefox If a user were tricked into viewing a malicious website, a remote attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program (CVE-2009-1392, CVE-2009-1832, CVE-2009-1833, CVE-2009-1837, CVE-2009-1838 ...
Synopsis Critical: seamonkey security update Type/Severity Security Advisory: Critical Topic Updated seamonkey packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 3 and 4This update has been rated as having critical security impact by the RedHat Security Response Team ...
Synopsis Critical: firefox security update Type/Severity Security Advisory: Critical Topic Updated firefox packages that fix several security issues are now availablefor Red Hat Enterprise Linux 4 and 5This update has been rated as having critical security impact by the RedHat Security Response Team ...
Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications, such as the Iceweasel web browser The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-1392 Several issues in the browser engine have been discovered, which can result in the execution of arbitrary ...
Mozilla Foundation Security Advisory 2009-26 Arbitrary domain cookie access by local file: resources Announced June 11, 2009 Reporter Gregory Fleischer Impact Moderate Products Firefox, SeaMonkey Fixed in ...

References

CWE-200https://bugzilla.mozilla.org/show_bug.cgi?id=491801http://secunia.com/advisories/35431http://www.vupen.com/english/advisories/2009/1572http://rhn.redhat.com/errata/RHSA-2009-1096.htmlhttp://www.securityfocus.com/bid/35326https://bugzilla.redhat.com/show_bug.cgi?id=503576http://secunia.com/advisories/35331https://rhn.redhat.com/errata/RHSA-2009-1095.htmlhttp://secunia.com/advisories/35439http://secunia.com/advisories/35428http://www.mozilla.org/security/announce/2009/mfsa2009-26.htmlhttp://www.securityfocus.com/bid/35391https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00657.htmlhttps://www.redhat.com/archives/fedora-package-announce/2009-June/msg00574.htmlhttp://osvdb.org/55161http://www.debian.org/security/2009/dsa-1820http://secunia.com/advisories/35468http://secunia.com/advisories/35561http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.372468http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.425408http://secunia.com/advisories/35415http://secunia.com/advisories/35882https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00444.htmlhttps://www.redhat.com/archives/fedora-package-announce/2009-July/msg00504.htmlhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-265068-1http://www.vupen.com/english/advisories/2009/2152http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020800.1-1https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9803https://usn.ubuntu.com/779-1/https://nvd.nist.gov