First published: Wed Sep 24 2008(Updated: )
Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 on Linux allows remote attackers to read arbitrary files via a .. (dot dot) and URL-encoded / (slash) characters in a resource: URI.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Linux | =4.0 | |
Ubuntu | =6.06 | |
Ubuntu | =7.04 | |
Ubuntu | =7.10 | |
Ubuntu | =8.04 | |
Firefox | <2.0.0.17 | |
Firefox | >=3.0<3.0.2 | |
Mozilla SeaMonkey | <1.1.12 | |
Thunderbird | <2.0.0.17 | |
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4067 is classified as a moderate severity vulnerability.
To mitigate CVE-2008-4067, users should upgrade to Firefox version 2.0.0.17 or later, Thunderbird version 2.0.0.17 or later, or SeaMonkey version 1.1.12 or later.
CVE-2008-4067 affects Firefox versions prior to 2.0.0.17, 3.x before 3.0.2, Thunderbird versions before 2.0.0.17, and SeaMonkey versions before 1.1.12.
Yes, CVE-2008-4067 is a vulnerability present in affected Mozilla software running on Linux-based systems.
CVE-2008-4067 allows remote attackers to exploit a directory traversal vulnerability to read arbitrary files via crafted resource URIs.