You are currently viewing a snapshot of taken on April 21, 2008. Most of this content is highly out of date (some pages haven't been updated since the project began in 1998) and exists for historical purposes only. If there are any pages on this archive site that you think should be added back to, please file a bug.

You are here: Known Vulnerabilities in Mozilla Products (Firefox > MFSA 2007-03

Mozilla Foundation Security Advisory 2007-03

Title: Information disclosure through cache collisions
Impact: Moderate
Announced: February 23, 2007
Reporter: Aad
Products: Firefox, SeaMonkey

Fixed in: Firefox
  SeaMonkey 1.0.8


Aad reported that two web pages can collide in the disk cache with the result that depending on order loaded the end of the longer document can be appended to the shorter when the shorter is reloaded from the cache. It is possible a determined hacker could construct a targeted attack to steal some sensitive data from a particular web page (for example, transaction history from a financial account). The potential victim would have to be already logged into the targeted service (or be fooled into doing so) and then visit the malicious site.

We have not calculated how much effort would be required to compute a colliding URL on a different host from the target page.


Temporarily set the disk cache size to zero (0) in the preferences until you can upgrade to a fixed version.