|Description||Mozilla Firefox before 188.8.131.52, Thunderbird before 184.108.40.206 and 2.x before 220.127.116.11, and SeaMonkey before 1.1.4 allow remote attackers to execute arbitrary commands via certain vectors associated with launching "a file handling program based on the file extension at the end of the URI," a variant of CVE-2007-4041. NOTE: the vendor states that "it is still possible to launch a filetype handler based on extension rather than the registered protocol handler."|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)|
|References||DSA-1344-1, DSA-1345-1, DSA-1346-1, DSA-1391-1, DTSA-51-1, DTSA-52-1, DTSA-53-1, DTSA-71-1|
|NVD severity||high (attack range: remote)|
Vulnerable and fixed packages
The table below lists information on source packages.
|stretch (security), stretch||1:52.3.0-4~deb9u1||fixed|
|iceweasel (PTS)||wheezy, wheezy (security)||38.8.0esr-1~deb7u1||fixed|
|xulrunner (PTS)||wheezy, wheezy (security)||24.8.1esr-2~deb7u1||fixed|
The information below is based on the following data on fixed versions.