First published: Wed Sep 24 2008(Updated: )
Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass "restrictions imposed on local HTML files," and obtain sensitive information and prompt users to write this information into a file, via directory traversal sequences in a resource: URI.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <2.0.0.17 | |
Firefox | >=3.0<3.0.2 | |
Mozilla SeaMonkey | <1.1.12 | |
Thunderbird | <2.0.0.17 | |
Debian Linux | =4.0 | |
Ubuntu | =6.06 | |
Ubuntu | =7.04 | |
Ubuntu | =7.10 | |
Ubuntu | =8.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4068 is classified as a high severity vulnerability due to the potential for sensitive information disclosure.
To mitigate CVE-2008-4068, users should upgrade to a fixed version of Mozilla Firefox or Thunderbird that is above 2.0.0.17 or 3.0.2 respectively.
CVE-2008-4068 affects Mozilla Firefox versions before 2.0.0.17 and 3.0.2, Thunderbird versions before 2.0.0.17, and SeaMonkey versions before 1.1.12.
Yes, CVE-2008-4068 allows remote attackers to bypass restrictions on local HTML files, potentially leading to unauthorized access to sensitive data.
While specific exploits for CVE-2008-4068 are not publicly detailed, the nature of the vulnerability suggests that it can be exploited to access local file contents.