Summary
This host is installed with Mozilla Firefox and is prone to insecure saving of downloadable file.
Impact
Local attackers may leverage this issue by replacing an arbitrary downloaded file by placing a file in a /tmp location before the download occurs.
Impact Level: Application
Solution
Upgrade to Mozilla Firefox version 3.6.3 or later
For updates refer to http://www.mozilla.com/en-US/firefox/
Insight
This security issue is due to the browser using a fixed path from the /tmp directory when a user opens a file downloaded for opening from the 'Downloads' window. This can be exploited to trick a user into opening a file with potentially malicious content by placing it in the /tmp directory before the download takes place.
Affected
Mozilla Firefox version 2.x, 3.x on Linux.
References
Severity
Classification
-
CVE CVE-2009-3274 -
CVSS Base Score: 4.4
AV:L/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Apache Tomcat Multiple Vulnerabilities - 02 Mar14
- Adobe Reader Multiple Unspecified Vulnerabilities Jun06 (Mac OS X)
- Adobe LiveCycle Designer Untrusted Search Path Vulnerability (Windows)
- Apple Safari Webcore Webkit 'XSSAuditor.cpp' XSS Vulnerability (Windows)
- Apple Safari Secure Cookie Security Bypass Vulnerability (Mac OS X)