First published: Thu Aug 13 2009(Updated: )
mailnews in Mozilla Thunderbird before 2.0.0.18 and SeaMonkey before 1.1.13, when JavaScript is enabled in mail, allows remote attackers to obtain sensitive information about the recipient, or comments in forwarded mail, via script that reads the (1) .documentURI or (2) .textContent DOM properties.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla SeaMonkey | =1.1.10 | |
Thunderbird | =1.5.0.7 | |
Thunderbird | =0.6 | |
Mozilla SeaMonkey | =1.0.3 | |
Thunderbird | =0.7.2 | |
Thunderbird | =2.0.0.4 | |
Mozilla SeaMonkey | =1.0.1 | |
Thunderbird | =2.0.0.6 | |
Mozilla SeaMonkey | =1.0.6 | |
Mozilla SeaMonkey | =1.0.9 | |
Thunderbird | =0.3 | |
Thunderbird | =0.2 | |
Mozilla SeaMonkey | =1.0 | |
Thunderbird | =1.0.7 | |
Mozilla SeaMonkey | =1.0.99 | |
Thunderbird | =2.0.0.9 | |
Mozilla SeaMonkey | =1.0.7 | |
Mozilla SeaMonkey | =1.0-beta | |
Mozilla SeaMonkey | <=1.1.12 | |
Thunderbird | =2.0.0.15 | |
Thunderbird | =2.0.0.16 | |
Thunderbird | =2.0.0.8 | |
Thunderbird | =2.0.0.7 | |
Mozilla SeaMonkey | =1.0-alpha | |
Thunderbird | =1.7.1 | |
Thunderbird | =1.5.0.3 | |
Thunderbird | =1.5.0.10 | |
Thunderbird | =1.5.0.5 | |
Thunderbird | =1.5.0.6 | |
Mozilla SeaMonkey | =1.1 | |
Thunderbird | =1.0 | |
Thunderbird | =2.0.0.3 | |
Thunderbird | =1.0.1 | |
Thunderbird | =1.5-beta2 | |
Thunderbird | =2.0.0.2 | |
Mozilla SeaMonkey | =1.0 | |
Mozilla SeaMonkey | =1.0.2 | |
Mozilla SeaMonkey | =1.0.8 | |
Thunderbird | =1.0.2 | |
Thunderbird | =2.0.0.0 | |
Thunderbird | =1.5.0.13 | |
Mozilla SeaMonkey | =1.1.11 | |
Mozilla SeaMonkey | =1.1.1 | |
Thunderbird | =2.0.0.12 | |
Thunderbird | =1.5 | |
Thunderbird | =1.5.0.2 | |
Thunderbird | =2.0.0.13 | |
Mozilla SeaMonkey | =1.0.5 | |
Thunderbird | =1.5.0.8 | |
Thunderbird | =2.0.0.14 | |
Thunderbird | =0.5 | |
Thunderbird | =1.0.4 | |
Thunderbird | =1.5.2 | |
Thunderbird | =1.5.0.9 | |
Thunderbird | =1.5.0.11 | |
Thunderbird | =0.9 | |
Thunderbird | =1.0.3 | |
Thunderbird | =2.0 | |
Thunderbird | =2.0.0.11 | |
Thunderbird | =1.5.0.12 | |
Thunderbird | =0.7.3 | |
Thunderbird | =0.4 | |
Mozilla SeaMonkey | =1.0 | |
Thunderbird | =1.5.1 | |
Thunderbird | =0.7 | |
Thunderbird | =1.5.0.14 | |
Thunderbird | =1.0.5-beta | |
Thunderbird | =2.0.0.5 | |
Thunderbird | =1.7.3 | |
Mozilla SeaMonkey | =1.0.4 | |
Thunderbird | =2.0.0.1 | |
Thunderbird | =1.5.0.1 | |
Thunderbird | =1.0.8 | |
Thunderbird | =0.1 | |
Thunderbird | <=2.0.0.17 | |
Thunderbird | =0.7.1 | |
Thunderbird | =1.0.5 | |
Thunderbird | =0.8 | |
Thunderbird | =1.5.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-6961 is classified as a moderate severity vulnerability.
To fix CVE-2008-6961, you should upgrade to Mozilla Thunderbird version 2.0.0.18 or later and SeaMonkey version 1.1.13 or later.
CVE-2008-6961 can be exploited through phishing or malicious emails that use JavaScript to access sensitive information.
CVE-2008-6961 affects Mozilla Thunderbird versions before 2.0.0.18 and SeaMonkey versions before 1.1.13.
CVE-2008-6961 can leak sensitive information such as the recipient's details or comments within forwarded emails.