Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2009-3376

EPSS 3.02% · P87
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2009-3376

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, does not properly handle a right-to-left override (aka RLO or U+202E) Unicode character in a download filename, which allows remote attackers to spoof file extensions via a crafted filename, as demonstrated by displaying a non-executable extension for an executable file.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Mozilla Firefox和SeaMonkey 下载文件名欺诈漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Mozilla Firefox3.0.15版本之前的版本和3.5.4版本之前的3.5.x版本,以及SeaMonkey 2.0版本之前的版本没有适当地处理对一个下载文件名中的统一字符编码标准字符的right-to-left滥用(又称RLO或U+202E)。这会允许远程攻击者可以借助一个特制的文件名,骗取文件扩展名,例如展示一个不可执行的扩展名以获得一个可执行的文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2009-3376

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2009-3376

Please Login to view more intelligence information

Same Patch Batch · n/a · 2009-10-29 · 18 CVEs total

CVE-2009-3379Mozilla Firefox libvorbis库多个远程内存破坏漏洞
CVE-2009-3640Linux kernel 输入验证错误漏洞
CVE-2009-3638Linux kernel 数字错误漏洞
CVE-2009-3627HTML-Parser无效HTML实体解析拒绝服务漏洞
CVE-2009-3626Perl 拒绝服务漏洞
CVE-2009-3383Mozilla Firefox JavaScript引擎多个远程内存破坏漏洞
CVE-2009-3382Mozilla Firefox浏览器引擎layout/base/nsCSSFrameConstructor.cpp 文件拒绝服务攻击漏洞
CVE-2009-3381Mozilla Firefox浏览器引擎多个远程内存破坏漏洞
CVE-2009-3380Mozilla Firefox 浏览器引擎中多个远程内存破坏漏洞
CVE-2009-3370Mozilla Firefox 表单历史信息泄露漏洞
CVE-2009-3378Mozilla Firefox liboggplay库oggplay_data_handle_theora_frame函数远程内存破坏漏洞
CVE-2009-3377Mozilla Firefox liboggz库远程内存破坏漏洞
CVE-2009-3375Mozilla Firefox 'document.getSelect' Cross Domain 信息泄露漏洞
CVE-2009-3374Mozilla Firefox的 XPCOM Utility Chrome 权限提升漏洞
CVE-2009-3373Mozilla Firefox 的libpr0n GIF解析器堆溢出漏洞
CVE-2009-3372Mozilla Firefox和SeaMonkey Proxy Auto-Configuration(PAC)文件远程代码执行漏洞
CVE-2009-3371Mozilla Firefox JavaScript Web-Workers 远程代码执行漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2009-3376

No comments yet


Leave a comment