Mozilla Firefox 3 before 3.0.11 associates an incorrect principal with a file: URL loaded through the location bar, which allows user-assisted remote attackers to bypass intended access restrictions and read files via a crafted HTML document, aka a file-URL-to-file-URL scripting attack.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firefox | Mozilla | * | 3.0.10 (including) |
Firefox | Mozilla | 3.0 (including) | 3.0 (including) |
Firefox | Mozilla | 3.0-alpha (including) | 3.0-alpha (including) |
Firefox | Mozilla | 3.0-beta2 (including) | 3.0-beta2 (including) |
Firefox | Mozilla | 3.0-beta5 (including) | 3.0-beta5 (including) |
Firefox | Mozilla | 3.0.1 (including) | 3.0.1 (including) |
Firefox | Mozilla | 3.0.2 (including) | 3.0.2 (including) |
Firefox | Mozilla | 3.0.3 (including) | 3.0.3 (including) |
Firefox | Mozilla | 3.0.4 (including) | 3.0.4 (including) |
Firefox | Mozilla | 3.0.5 (including) | 3.0.5 (including) |
Firefox | Mozilla | 3.0.6 (including) | 3.0.6 (including) |
Firefox | Mozilla | 3.0.7 (including) | 3.0.7 (including) |
Firefox | Mozilla | 3.0.8 (including) | 3.0.8 (including) |
Firefox | Mozilla | 3.0.9 (including) | 3.0.9 (including) |
Firefox | Mozilla | 3.0beta5 (including) | 3.0beta5 (including) |
Firefox | Mozilla | 3.1-beta1 (including) | 3.1-beta1 (including) |
Red Hat Enterprise Linux 4 | RedHat | firefox-0:3.0.11-4.el4 | * |
Red Hat Enterprise Linux 5 | RedHat | firefox-0:3.0.11-2.el5_3 | * |
Red Hat Enterprise Linux 5 | RedHat | xulrunner-0:1.9.0.11-3.el5_3 | * |
Firefox | Ubuntu | dapper | * |
Xulrunner-1.9 | Ubuntu | hardy | * |
Xulrunner-1.9 | Ubuntu | intrepid | * |
Xulrunner-1.9 | Ubuntu | jaunty | * |
Xulrunner-1.9.1 | Ubuntu | devel | * |
Xulrunner-1.9.1 | Ubuntu | jaunty | * |
Xulrunner-1.9.1 | Ubuntu | karmic | * |