Mozilla Firefox Temporary File Download Manipulation Security Issue
|
Secunia Advisory:
|
SA36649
|
|
Release Date:
|
2009-09-09
|
Popularity:
|
2,459 views
|
|
Critical:
|
 Not critical
|
Impact:
|
Manipulation of data
|
Where:
|
Local system
|
Solution Status:
|
Unpatched
|
|
Software: | Mozilla Firefox 3.0.x Mozilla Firefox 3.5.x
|
|
Secunia CVSS-2 Score:
|
Available in Secunia business solutions
|
|
Subscribe:
|
Instant alerts on relevant vulnerabilities
|
|
Advisory Content (Page 1 of 3) | [ 1 ] [ 2 ] [ 3 ] | |
|
Description: Jeremy Brown has discovered a security issue in Mozilla Firefox, which can be exploited by malicious, local users to manipulate certain data.
The security issue is caused due to the browser using a fixed path from the /tmp directory when a user opens a file downloaded for opening from the "Downloads" window. This can be exploited to trick a user into opening a file with potentially malicious content by placing it in the /tmp directory before the download takes place.
The security issue is confirmed in version 3.5.2 for Linux. Other versions may also be affected.
Change Page: [ 1 ] [ 2 ] [ 3 ]
|
|
Track this Secunia Advisory
|
Customers of the Secunia Vulnerability Intelligence solutions will automatically receive updates when new information regarding this advisory is released.
Read more about our Vulnerability Intelligence solutions and what they can do for you and your company.
|
|
About this Secunia Advisory
|
Please note: The information that this Secunia Advisory is based on comes from a third party unless stated otherwise.
Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.
|