CVE-2006-1729

MEDIUM

Description

Mozilla Firefox 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to read arbitrary files by (1) inserting the target filename into a text box, then turning that box into a file upload control, or (2) changing the type of the input control that is associated with an event handler.

References

ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt

ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc

http://lists.suse.com/archive/suse-security-announce/2006-Apr/0003.html

http://secunia.com/advisories/19631

http://secunia.com/advisories/19649

http://secunia.com/advisories/19696

http://secunia.com/advisories/19714

http://secunia.com/advisories/19721

http://secunia.com/advisories/19729

http://secunia.com/advisories/19746

http://secunia.com/advisories/19759

http://secunia.com/advisories/19794

http://secunia.com/advisories/19811

http://secunia.com/advisories/19852

http://secunia.com/advisories/19862

http://secunia.com/advisories/19863

http://secunia.com/advisories/19902

http://secunia.com/advisories/19941

http://secunia.com/advisories/21033

http://secunia.com/advisories/21622

http://secunia.com/advisories/22066

http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1

http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1

http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm

http://www.debian.org/security/2006/dsa-1044

http://www.debian.org/security/2006/dsa-1046

http://www.debian.org/security/2006/dsa-1051

http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml

http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml

http://www.mandriva.com/security/advisories?name=MDKSA-2006:075

http://www.mandriva.com/security/advisories?name=MDKSA-2006:076

http://www.mozilla.org/security/announce/2006/mfsa2006-23.html

http://www.novell.com/linux/security/advisories/2006_35_mozilla.html

http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00153.html

http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00154.html

http://www.redhat.com/support/errata/RHSA-2006-0328.html

http://www.redhat.com/support/errata/RHSA-2006-0329.html

http://www.securityfocus.com/archive/1/436296/100/0/threaded

http://www.securityfocus.com/archive/1/436338/100/0/threaded

http://www.securityfocus.com/archive/1/446658/100/200/threaded

http://www.securityfocus.com/bid/17516

http://www.vupen.com/english/advisories/2006/1356

http://www.vupen.com/english/advisories/2006/3391

http://www.vupen.com/english/advisories/2006/3748

http://www.vupen.com/english/advisories/2008/0083

https://exchange.xforce.ibmcloud.com/vulnerabilities/25823

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10922

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1929

https://usn.ubuntu.com/271-1/

https://usn.ubuntu.com/275-1/

Details

Source: MITRE

Published: 2006-04-14

Updated: 2018-10-18

Type: CWE-20

Risk Information

CVSS v2.0

Base Score: 4.3

Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM