Mozilla Suite 1.7.13, Mozilla Firefox 1.5.0.3 and possibly other versions before before 1.8.0, and Netscape 7.2 and 8.1, and possibly other versions and products, allows remote user-assisted attackers to obtain information such as the installation path by causing exceptions to be thrown and checking the message contents.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.mandriva.com/security/advisories?name=MDKSA-2006:145 | vendor advisory |
http://secunia.com/advisories/20244 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26667 | vdb entry |
http://secunia.com/advisories/20255 | third party advisory vendor advisory |
http://secunia.com/advisories/21532 | third party advisory vendor advisory |
http://www.securityfocus.com/archive/1/434696/100/0/threaded | mailing list |
http://secunia.com/advisories/20256 | third party advisory vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=267645 | patch |
https://bugzilla.mozilla.org/attachment.cgi?id=164547 | exploit |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:143 | vendor advisory |
http://securityreason.com/securityalert/960 | third party advisory |