First published: Fri Sep 24 2004(Updated: )
The XPInstall installer in Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 sets insecure permissions for certain installed files within xpi packages, which could allow local users to overwrite arbitrary files or execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Mozilla | =1.4.2 | |
Mozilla Mozilla | =0.9.5 | |
Mozilla Thunderbird | =0.6 | |
Mozilla Thunderbird | =0.7.2 | |
Mozilla Mozilla | =0.9.35 | |
Mozilla Thunderbird | =0.3 | |
Mozilla Mozilla | =0.9.3 | |
Mozilla Mozilla | =1.0.1 | |
Mozilla Mozilla | =1.7-alpha | |
Mozilla Thunderbird | =0.2 | |
Mozilla Mozilla | =0.9.48 | |
Mozilla Mozilla | =1.7-rc1 | |
Mozilla Mozilla | =1.2.1 | |
Mozilla Mozilla | =1.0-rc1 | |
Mozilla Mozilla | =1.2-alpha | |
Mozilla Mozilla | =1.7 | |
Mozilla Mozilla | =0.9.7 | |
Mozilla Mozilla | =1.1-beta | |
Mozilla Mozilla | =1.0-rc2 | |
Mozilla Mozilla | =0.9.2.1 | |
Mozilla Mozilla | =1.4.1 | |
Mozilla Mozilla | =1.4-beta | |
Mozilla Mozilla | =1.2 | |
Mozilla Mozilla | =0.9.2 | |
Mozilla Mozilla | =1.4.4 | |
Mozilla Mozilla | =1.3 | |
Mozilla Mozilla | =1.2-beta | |
Mozilla Mozilla | =1.0 | |
Mozilla Mozilla | =1.7-beta | |
Mozilla Mozilla | =0.9.8 | |
Mozilla Mozilla | =1.4 | |
Mozilla Mozilla | =1.5 | |
Mozilla Mozilla | =0.9.4 | |
Mozilla Thunderbird | =0.5 | |
Mozilla Mozilla | =1.7.1 | |
Mozilla Thunderbird | =0.7.3 | |
Mozilla Mozilla | =1.4-alpha | |
Mozilla Thunderbird | =0.4 | |
Mozilla Thunderbird | =0.7 | |
Mozilla Mozilla | =0.9.6 | |
Mozilla Mozilla | =1.5.1 | |
Mozilla Mozilla | =1.1 | |
Mozilla Mozilla | =1.1-alpha | |
Mozilla Mozilla | =0.9.4.1 | |
Mozilla Mozilla | =0.8 | |
Mozilla Mozilla | =1.7.2 | |
Mozilla Thunderbird | =0.1 | |
Mozilla Mozilla | =1.0.2 | |
Mozilla Mozilla | =1.7-rc3 | |
Mozilla Thunderbird | =0.7.1 | |
Mozilla Mozilla | =1.7-rc2 | |
Mozilla Mozilla | =1.3.1 | |
Mozilla Mozilla | =0.9.9 | |
Mozilla Mozilla | =1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.