CVE-2007-3845

Mozilla Firefox before 2.0.0.6, Thunderbird before 1.5.0.13 and 2.x before 2.0.0.6, and SeaMonkey before 1.1.4 allow remote attackers to execute arbitrary commands via certain vectors associated with launching "a file handling program based on the file extension at the end of the URI," a variant of CVE-2007-4041. NOTE: the vendor states that "it is still possible to launch a filetype handler based on extension rather than the registered protocol handler."
References
Link Resource
http://bugzilla.mozilla.org/show_bug.cgi?id=389580
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579
http://secunia.com/advisories/26234
http://secunia.com/advisories/26258
http://secunia.com/advisories/26303
http://secunia.com/advisories/26309
http://secunia.com/advisories/26331
http://secunia.com/advisories/26335
http://secunia.com/advisories/26393
http://secunia.com/advisories/26572
http://secunia.com/advisories/27326
http://secunia.com/advisories/27414
http://secunia.com/advisories/28135
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.010101
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103177-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1
http://www.debian.org/security/2007/dsa-1344
http://www.debian.org/security/2007/dsa-1345
http://www.debian.org/security/2007/dsa-1346
http://www.debian.org/security/2007/dsa-1391
http://www.mandriva.com/security/advisories?name=MDKSA-2007:152
http://www.mandriva.com/security/advisories?name=MDVSA-2007:047
http://www.mandriva.com/security/advisories?name=MDVSA-2008:047
http://www.mozilla.org/security/announce/2007/mfsa2007-27.html
http://www.securityfocus.com/archive/1/475265/100/200/threaded
http://www.securityfocus.com/archive/1/475450/30/5550/threaded
http://www.securityfocus.com/bid/25053
http://www.ubuntu.com/usn/usn-493-1
http://www.ubuntu.com/usn/usn-503-1
http://www.vupen.com/english/advisories/2007/4256
http://www.vupen.com/english/advisories/2008/0082
https://bugzilla.mozilla.org/show_bug.cgi?id=389106
https://issues.rpath.com/browse/RPL-1600
http://bugzilla.mozilla.org/show_bug.cgi?id=389580
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579
http://secunia.com/advisories/26234
http://secunia.com/advisories/26258
http://secunia.com/advisories/26303
http://secunia.com/advisories/26309
http://secunia.com/advisories/26331
http://secunia.com/advisories/26335
http://secunia.com/advisories/26393
http://secunia.com/advisories/26572
http://secunia.com/advisories/27326
http://secunia.com/advisories/27414
http://secunia.com/advisories/28135
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.010101
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103177-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1
http://www.debian.org/security/2007/dsa-1344
http://www.debian.org/security/2007/dsa-1345
http://www.debian.org/security/2007/dsa-1346
http://www.debian.org/security/2007/dsa-1391
http://www.mandriva.com/security/advisories?name=MDKSA-2007:152
http://www.mandriva.com/security/advisories?name=MDVSA-2007:047
http://www.mandriva.com/security/advisories?name=MDVSA-2008:047
http://www.mozilla.org/security/announce/2007/mfsa2007-27.html
http://www.securityfocus.com/archive/1/475265/100/200/threaded
http://www.securityfocus.com/archive/1/475450/30/5550/threaded
http://www.securityfocus.com/bid/25053
http://www.ubuntu.com/usn/usn-493-1
http://www.ubuntu.com/usn/usn-503-1
http://www.vupen.com/english/advisories/2007/4256
http://www.vupen.com/english/advisories/2008/0082
https://bugzilla.mozilla.org/show_bug.cgi?id=389106
https://issues.rpath.com/browse/RPL-1600
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*
OR cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*

History

21 Nov 2024, 00:34

Type Values Removed Values Added
References () http://bugzilla.mozilla.org/show_bug.cgi?id=389580 - () http://bugzilla.mozilla.org/show_bug.cgi?id=389580 -
References () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 - () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 -
References () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579 - () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579 -
References () http://secunia.com/advisories/26234 - () http://secunia.com/advisories/26234 -
References () http://secunia.com/advisories/26258 - () http://secunia.com/advisories/26258 -
References () http://secunia.com/advisories/26303 - () http://secunia.com/advisories/26303 -
References () http://secunia.com/advisories/26309 - () http://secunia.com/advisories/26309 -
References () http://secunia.com/advisories/26331 - () http://secunia.com/advisories/26331 -
References () http://secunia.com/advisories/26335 - () http://secunia.com/advisories/26335 -
References () http://secunia.com/advisories/26393 - () http://secunia.com/advisories/26393 -
References () http://secunia.com/advisories/26572 - () http://secunia.com/advisories/26572 -
References () http://secunia.com/advisories/27326 - () http://secunia.com/advisories/27326 -
References () http://secunia.com/advisories/27414 - () http://secunia.com/advisories/27414 -
References () http://secunia.com/advisories/28135 - () http://secunia.com/advisories/28135 -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.010101 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.010101 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-103177-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-103177-1 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1 -
References () http://www.debian.org/security/2007/dsa-1344 - () http://www.debian.org/security/2007/dsa-1344 -
References () http://www.debian.org/security/2007/dsa-1345 - () http://www.debian.org/security/2007/dsa-1345 -
References () http://www.debian.org/security/2007/dsa-1346 - () http://www.debian.org/security/2007/dsa-1346 -
References () http://www.debian.org/security/2007/dsa-1391 - () http://www.debian.org/security/2007/dsa-1391 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:152 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:152 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2007:047 - () http://www.mandriva.com/security/advisories?name=MDVSA-2007:047 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:047 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:047 -
References () http://www.mozilla.org/security/announce/2007/mfsa2007-27.html - () http://www.mozilla.org/security/announce/2007/mfsa2007-27.html -
References () http://www.securityfocus.com/archive/1/475265/100/200/threaded - () http://www.securityfocus.com/archive/1/475265/100/200/threaded -
References () http://www.securityfocus.com/archive/1/475450/30/5550/threaded - () http://www.securityfocus.com/archive/1/475450/30/5550/threaded -
References () http://www.securityfocus.com/bid/25053 - () http://www.securityfocus.com/bid/25053 -
References () http://www.ubuntu.com/usn/usn-493-1 - () http://www.ubuntu.com/usn/usn-493-1 -
References () http://www.ubuntu.com/usn/usn-503-1 - () http://www.ubuntu.com/usn/usn-503-1 -
References () http://www.vupen.com/english/advisories/2007/4256 - () http://www.vupen.com/english/advisories/2007/4256 -
References () http://www.vupen.com/english/advisories/2008/0082 - () http://www.vupen.com/english/advisories/2008/0082 -
References () https://bugzilla.mozilla.org/show_bug.cgi?id=389106 - () https://bugzilla.mozilla.org/show_bug.cgi?id=389106 -
References () https://issues.rpath.com/browse/RPL-1600 - () https://issues.rpath.com/browse/RPL-1600 -

07 Nov 2023, 02:00

Type Values Removed Values Added
Summary Mozilla Firefox before 2.0.0.6, Thunderbird before 1.5.0.13 and 2.x before 2.0.0.6, and SeaMonkey before 1.1.4 allow remote attackers to execute arbitrary commands via certain vectors associated with launching "a file handling program based on the file extension at the end of the URI," a variant of CVE-2007-4041. NOTE: the vendor states that "it is still possible to launch a filetype handler based on extension rather than the registered protocol handler." Mozilla Firefox before 2.0.0.6, Thunderbird before 1.5.0.13 and 2.x before 2.0.0.6, and SeaMonkey before 1.1.4 allow remote attackers to execute arbitrary commands via certain vectors associated with launching "a file handling program based on the file extension at the end of the URI," a variant of CVE-2007-4041. NOTE: the vendor states that "it is still possible to launch a filetype handler based on extension rather than the registered protocol handler."

Information

Published : 2007-08-08 01:17

Updated : 2024-11-21 00:34


NVD link : CVE-2007-3845

Mitre link : CVE-2007-3845

CVE.ORG link : CVE-2007-3845


JSON object : View

Products Affected

mozilla

  • thunderbird
  • firefox
  • seamonkey

microsoft

  • windows_xp