Vulnerability Name: | CVE-2004-0648 (CCN-16655) |
Assigned: | 2004-07-07 |
Published: | 2004-07-07 |
Updated: | 2017-07-11 |
Summary: | Mozilla (Suite) before 1.7.1, Firefox before 0.9.2, and Thunderbird before 0.7.2 allow remote attackers to launch arbitrary programs via a URI referencing the shell: protocol.
|
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Changed
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High |
|
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete |
|
Vulnerability Type: | CWE-Other
|
Vulnerability Consequences: | Gain Access |
References: | Source: CCN Type: BugTraq Mailing List, Thu Jul 08 2004 - 20:07:17 CDT MOZILLA: execute local file and its fix
Source: CCN Type: Full-Disclosure Mailing List, Thu Jul 08 2004 - 03:46:29 CDT Re: [Full-Disclosure] shell:windows command question
Source: CCN Type: Full-Disclosure Mailing List, Thu Jul 08 2004 - 17:36:48 CDT Mozilla Security Advisory 2004-07-08
Source: CCN Type: [Full-Disclosure Mailing List, Thu Jul 08 2004 - 20:31:13 CDT Re: [Full-Disclosure] Mozilla Security Advisory 2004-07-08
Source: MITRE Type: CNA CVE-2004-0648
Source: FULLDISC Type: UNKNOWN 20040707 shell:windows command question
Source: BUGTRAQ Type: UNKNOWN 20040708 Mozilla Security Advisory 2004-07-08
Source: CCN Type: SA12027 Mozilla Fails to Restrict Access to "shell:"
Source: SECUNIA Type: UNKNOWN 12027
Source: CCN Type: CIAC Information Bulletin 0-175 'shell:' Protocol Security Issue
Source: CIAC Type: UNKNOWN O-175
Source: CCN Type: US-CERT VU#927014 Mozilla fails to restrict access to the shell: URI handler
Source: CERT-VN Type: Third Party Advisory, US Government Resource VU#927014
Source: CCN Type: Mozilla Web site mozilla - home of the mozilla, firefox, and camino web browsers
Source: CONFIRM Type: UNKNOWN http://www.mozilla.org/projects/security/known-vulnerabilities.html
Source: CONFIRM Type: UNKNOWN http://www.mozilla.org/security/shell.html
Source: CCN Type: OSVDB ID: 59025 Netscape shell: URI Arbitrary Command Execution
Source: CCN Type: OSVDB ID: 59026 K-Meleon shell: URI Arbitrary Command Execution
Source: CCN Type: OSVDB ID: 7595 Mozilla Browsers shell: URI Arbitrary Command Execution
Source: CCN Type: BID-10681 Mozilla External Protocol Handler Weakness
Source: XF Type: UNKNOWN mozilla-shell-program-execution(16655)
Source: XF Type: UNKNOWN mozilla-shell-program-execution(16655)
|
Vulnerable Configuration: | Configuration 1: cpe:/a:mozilla:firefox:*:*:*:*:*:*:*:* (Version <= 0.9.2)OR cpe:/a:mozilla:mozilla:*:*:*:*:*:*:*:* (Version <= 1.7.1)OR cpe:/a:mozilla:thunderbird:*:*:*:*:*:*:*:* (Version <= 0.7.2) Configuration CCN 1: cpe:/a:mozilla:mozilla:1.0:rc1:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.0:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.0.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.2.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.3:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.4:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.3.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.6:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.7:rc3:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:0.8:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:0.9:rc:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.7:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:0.9:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.0.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.1:alpha:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.1:beta:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.2:alpha:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.2:beta:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.4.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.4.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.4.4:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.4:beta:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.5:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.5.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.5:alpha:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.5:rc1:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.5:rc2:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.6:alpha:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.6:beta:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.7:alpha:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.7:beta:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.7:rc1:*:*:*:*:*:*OR cpe:/a:mozilla:mozilla:1.7:rc2:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.7:-:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:0.7:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |