Action not permitted
Modal body text goes here.
Modal Title
Modal Body
opensuse-su-2024:10590-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
seamonkey-2.53.9.1-1.1 on GA media
Notes
Title of the patch
seamonkey-2.53.9.1-1.1 on GA media
Description of the patch
These are all security issues fixed in the seamonkey-2.53.9.1-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10590
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "seamonkey-2.53.9.1-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the seamonkey-2.53.9.1-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10590", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10590-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2007-4879 page", "url": "https://www.suse.com/security/cve/CVE-2007-4879/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-0412 page", "url": "https://www.suse.com/security/cve/CVE-2008-0412/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-0414 page", "url": "https://www.suse.com/security/cve/CVE-2008-0414/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-0415 page", "url": "https://www.suse.com/security/cve/CVE-2008-0415/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-0418 page", "url": "https://www.suse.com/security/cve/CVE-2008-0418/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-0419 page", "url": "https://www.suse.com/security/cve/CVE-2008-0419/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-0592 page", "url": "https://www.suse.com/security/cve/CVE-2008-0592/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-0593 page", "url": "https://www.suse.com/security/cve/CVE-2008-0593/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-1195 page", "url": "https://www.suse.com/security/cve/CVE-2008-1195/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-1233 page", "url": "https://www.suse.com/security/cve/CVE-2008-1233/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-1236 page", "url": "https://www.suse.com/security/cve/CVE-2008-1236/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-1238 page", "url": "https://www.suse.com/security/cve/CVE-2008-1238/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-1241 page", "url": "https://www.suse.com/security/cve/CVE-2008-1241/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12359 page", "url": "https://www.suse.com/security/cve/CVE-2018-12359/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12360 page", "url": "https://www.suse.com/security/cve/CVE-2018-12360/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12362 page", "url": "https://www.suse.com/security/cve/CVE-2018-12362/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12363 page", "url": "https://www.suse.com/security/cve/CVE-2018-12363/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12364 page", "url": "https://www.suse.com/security/cve/CVE-2018-12364/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12365 page", "url": "https://www.suse.com/security/cve/CVE-2018-12365/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12366 page", "url": "https://www.suse.com/security/cve/CVE-2018-12366/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5156 page", "url": "https://www.suse.com/security/cve/CVE-2018-5156/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5188 page", "url": "https://www.suse.com/security/cve/CVE-2018-5188/" } ], "title": "seamonkey-2.53.9.1-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10590-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "seamonkey-2.53.9.1-1.1.aarch64", "product": { "name": "seamonkey-2.53.9.1-1.1.aarch64", "product_id": "seamonkey-2.53.9.1-1.1.aarch64" } }, { "category": "product_version", "name": "seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "product": { "name": "seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "product_id": "seamonkey-dom-inspector-2.53.9.1-1.1.aarch64" } }, { "category": "product_version", "name": "seamonkey-irc-2.53.9.1-1.1.aarch64", "product": { "name": "seamonkey-irc-2.53.9.1-1.1.aarch64", "product_id": "seamonkey-irc-2.53.9.1-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "seamonkey-2.53.9.1-1.1.ppc64le", "product": { "name": "seamonkey-2.53.9.1-1.1.ppc64le", "product_id": "seamonkey-2.53.9.1-1.1.ppc64le" } }, { "category": "product_version", "name": "seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "product": { "name": "seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "product_id": "seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le" } }, { "category": "product_version", "name": "seamonkey-irc-2.53.9.1-1.1.ppc64le", "product": { "name": "seamonkey-irc-2.53.9.1-1.1.ppc64le", "product_id": "seamonkey-irc-2.53.9.1-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "seamonkey-2.53.9.1-1.1.s390x", "product": { "name": "seamonkey-2.53.9.1-1.1.s390x", "product_id": "seamonkey-2.53.9.1-1.1.s390x" } }, { "category": "product_version", "name": "seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "product": { "name": "seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "product_id": "seamonkey-dom-inspector-2.53.9.1-1.1.s390x" } }, { "category": "product_version", "name": "seamonkey-irc-2.53.9.1-1.1.s390x", "product": { "name": "seamonkey-irc-2.53.9.1-1.1.s390x", "product_id": "seamonkey-irc-2.53.9.1-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "seamonkey-2.53.9.1-1.1.x86_64", "product": { "name": "seamonkey-2.53.9.1-1.1.x86_64", "product_id": "seamonkey-2.53.9.1-1.1.x86_64" } }, { "category": "product_version", "name": "seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "product": { "name": "seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "product_id": "seamonkey-dom-inspector-2.53.9.1-1.1.x86_64" } }, { "category": "product_version", "name": "seamonkey-irc-2.53.9.1-1.1.x86_64", "product": { "name": "seamonkey-irc-2.53.9.1-1.1.x86_64", "product_id": "seamonkey-irc-2.53.9.1-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "seamonkey-2.53.9.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64" }, "product_reference": "seamonkey-2.53.9.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-2.53.9.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le" }, "product_reference": "seamonkey-2.53.9.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-2.53.9.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x" }, "product_reference": "seamonkey-2.53.9.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-2.53.9.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64" }, "product_reference": "seamonkey-2.53.9.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-2.53.9.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64" }, "product_reference": "seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le" }, "product_reference": "seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-2.53.9.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x" }, "product_reference": "seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-2.53.9.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64" }, "product_reference": "seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-irc-2.53.9.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64" }, "product_reference": "seamonkey-irc-2.53.9.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-irc-2.53.9.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le" }, "product_reference": "seamonkey-irc-2.53.9.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-irc-2.53.9.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x" }, "product_reference": "seamonkey-irc-2.53.9.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-irc-2.53.9.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" }, "product_reference": "seamonkey-irc-2.53.9.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-4879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-4879" } ], "notes": [ { "category": "general", "text": "Mozilla Firefox before Firefox 2.0.0.13, and SeaMonkey before 1.1.9, can automatically install TLS client certificates with minimal user interaction, and automatically sends these certificates when requested, which makes it easier for remote web sites to track user activities across domains by requesting the TLS client certificates from other domains.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-4879", "url": "https://www.suse.com/security/cve/CVE-2007-4879" }, { "category": "external", "summary": "SUSE Bug 370353 for CVE-2007-4879", "url": "https://bugzilla.suse.com/370353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2007-4879" }, { "cve": "CVE-2008-0412", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-0412" } ], "notes": [ { "category": "general", "text": "The browser engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to the (1) nsTableFrame::GetFrameAtOrBefore, (2) nsAccessibilityService::GetAccessible, (3) nsBindingManager::GetNestedInsertionPoint, (4) nsXBLPrototypeBinding::AttributeChanged, (5) nsColumnSetFrame::GetContentInsertionFrame, and (6) nsLineLayout::TrimTrailingWhiteSpaceIn methods, and other vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-0412", "url": "https://www.suse.com/security/cve/CVE-2008-0412" }, { "category": "external", "summary": "SUSE Bug 354469 for CVE-2008-0412", "url": "https://bugzilla.suse.com/354469" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2008-0412" }, { "cve": "CVE-2008-0414", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-0414" } ], "notes": [ { "category": "general", "text": "Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to trick the user into uploading arbitrary files via label tags that shift focus to a file input field, aka \"focus spoofing.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-0414", "url": "https://www.suse.com/security/cve/CVE-2008-0414" }, { "category": "external", "summary": "SUSE Bug 354469 for CVE-2008-0414", "url": "https://bugzilla.suse.com/354469" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2008-0414" }, { "cve": "CVE-2008-0415", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-0415" } ], "notes": [ { "category": "general", "text": "Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to execute script outside of the sandbox and conduct cross-site scripting (XSS) attacks via multiple vectors including the XMLDocument.load function, aka \"JavaScript privilege escalation bugs.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-0415", "url": "https://www.suse.com/security/cve/CVE-2008-0415" }, { "category": "external", "summary": "SUSE Bug 354469 for CVE-2008-0415", "url": "https://bugzilla.suse.com/354469" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2008-0415" }, { "cve": "CVE-2008-0418", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-0418" } ], "notes": [ { "category": "general", "text": "Directory traversal vulnerability in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8, when using \"flat\" addons, allows remote attackers to read arbitrary Javascript, image, and stylesheet files via the chrome: URI scheme, as demonstrated by stealing session information from sessionstore.js.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-0418", "url": "https://www.suse.com/security/cve/CVE-2008-0418" }, { "category": "external", "summary": "SUSE Bug 354469 for CVE-2008-0418", "url": "https://bugzilla.suse.com/354469" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2008-0418" }, { "cve": "CVE-2008-0419", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-0419" } ], "notes": [ { "category": "general", "text": "Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows remote attackers to steal navigation history and cause a denial of service (crash) via images in a page that uses designMode frames, which triggers memory corruption related to resize handles.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-0419", "url": "https://www.suse.com/security/cve/CVE-2008-0419" }, { "category": "external", "summary": "SUSE Bug 354469 for CVE-2008-0419", "url": "https://bugzilla.suse.com/354469" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2008-0419" }, { "cve": "CVE-2008-0592", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-0592" } ], "notes": [ { "category": "general", "text": "Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to cause a denial of service via a plain .txt file with a \"Content-Disposition: attachment\" and an invalid \"Content-Type: plain/text,\" which prevents Firefox from rendering future plain text files within the browser.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-0592", "url": "https://www.suse.com/security/cve/CVE-2008-0592" }, { "category": "external", "summary": "SUSE Bug 354469 for CVE-2008-0592", "url": "https://bugzilla.suse.com/354469" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2008-0592" }, { "cve": "CVE-2008-0593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-0593" } ], "notes": [ { "category": "general", "text": "Gecko-based browsers, including Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8, modify the .href property of stylesheet DOM nodes to the final URI of a 302 redirect, which might allow remote attackers to bypass the Same Origin Policy and read sensitive information from the original URL, such as with Single-Signon systems.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-0593", "url": "https://www.suse.com/security/cve/CVE-2008-0593" }, { "category": "external", "summary": "SUSE Bug 354469 for CVE-2008-0593", "url": "https://bugzilla.suse.com/354469" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2008-0593" }, { "cve": "CVE-2008-1195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-1195" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Sun JDK and Java Runtime Environment (JRE) 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to access arbitrary network services on the local host via unspecified vectors related to JavaScript and Java APIs.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-1195", "url": "https://www.suse.com/security/cve/CVE-2008-1195" }, { "category": "external", "summary": "SUSE Bug 368134 for CVE-2008-1195", "url": "https://bugzilla.suse.com/368134" }, { "category": "external", "summary": "SUSE Bug 370353 for CVE-2008-1195", "url": "https://bugzilla.suse.com/370353" }, { "category": "external", "summary": "SUSE Bug 379038 for CVE-2008-1195", "url": "https://bugzilla.suse.com/379038" }, { "category": "external", "summary": "SUSE Bug 404983 for CVE-2008-1195", "url": "https://bugzilla.suse.com/404983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2008-1195" }, { "cve": "CVE-2008-1233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-1233" } ], "notes": [ { "category": "general", "text": "Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via \"XPCNativeWrapper pollution.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-1233", "url": "https://www.suse.com/security/cve/CVE-2008-1233" }, { "category": "external", "summary": "SUSE Bug 370353 for CVE-2008-1233", "url": "https://bugzilla.suse.com/370353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2008-1233" }, { "cve": "CVE-2008-1236", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-1236" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the layout engine.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-1236", "url": "https://www.suse.com/security/cve/CVE-2008-1236" }, { "category": "external", "summary": "SUSE Bug 370353 for CVE-2008-1236", "url": "https://bugzilla.suse.com/370353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2008-1236" }, { "cve": "CVE-2008-1238", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-1238" } ], "notes": [ { "category": "general", "text": "Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9, when generating the HTTP Referer header, does not list the entire URL when it contains Basic Authentication credentials without a username, which makes it easier for remote attackers to bypass application protection mechanisms that rely on Referer headers, such as with some Cross-Site Request Forgery (CSRF) mechanisms.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-1238", "url": "https://www.suse.com/security/cve/CVE-2008-1238" }, { "category": "external", "summary": "SUSE Bug 370353 for CVE-2008-1238", "url": "https://bugzilla.suse.com/370353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2008-1238" }, { "cve": "CVE-2008-1241", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-1241" } ], "notes": [ { "category": "general", "text": "GUI overlay vulnerability in Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9 allows remote attackers to spoof form elements and redirect user inputs via a borderless XUL pop-up window from a background tab.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-1241", "url": "https://www.suse.com/security/cve/CVE-2008-1241" }, { "category": "external", "summary": "SUSE Bug 370353 for CVE-2008-1241", "url": "https://bugzilla.suse.com/370353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2008-1241" }, { "cve": "CVE-2018-12359", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12359" } ], "notes": [ { "category": "general", "text": "A buffer overflow can occur when rendering canvas content while adjusting the height and width of the canvas element dynamically, causing data to be written outside of the currently computed boundaries. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12359", "url": "https://www.suse.com/security/cve/CVE-2018-12359" }, { "category": "external", "summary": "SUSE Bug 1098998 for CVE-2018-12359", "url": "https://bugzilla.suse.com/1098998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12359" }, { "cve": "CVE-2018-12360", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12360" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability can occur when deleting an input element during a mutation event handler triggered by focusing that element. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12360", "url": "https://www.suse.com/security/cve/CVE-2018-12360" }, { "category": "external", "summary": "SUSE Bug 1098998 for CVE-2018-12360", "url": "https://bugzilla.suse.com/1098998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12360" }, { "cve": "CVE-2018-12362", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12362" } ], "notes": [ { "category": "general", "text": "An integer overflow can occur during graphics operations done by the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12362", "url": "https://www.suse.com/security/cve/CVE-2018-12362" }, { "category": "external", "summary": "SUSE Bug 1098998 for CVE-2018-12362", "url": "https://bugzilla.suse.com/1098998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12362" }, { "cve": "CVE-2018-12363", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12363" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability can occur when script uses mutation events to move DOM nodes between documents, resulting in the old document that held the node being freed but the node still having a pointer referencing it. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12363", "url": "https://www.suse.com/security/cve/CVE-2018-12363" }, { "category": "external", "summary": "SUSE Bug 1098998 for CVE-2018-12363", "url": "https://bugzilla.suse.com/1098998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12363" }, { "cve": "CVE-2018-12364", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12364" } ], "notes": [ { "category": "general", "text": "NPAPI plugins, such as Adobe Flash, can send non-simple cross-origin requests, bypassing CORS by making a same-origin POST that does a 307 redirect to the target site. This allows for a malicious site to engage in cross-site request forgery (CSRF) attacks. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12364", "url": "https://www.suse.com/security/cve/CVE-2018-12364" }, { "category": "external", "summary": "SUSE Bug 1098998 for CVE-2018-12364", "url": "https://bugzilla.suse.com/1098998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12364" }, { "cve": "CVE-2018-12365", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12365" } ], "notes": [ { "category": "general", "text": "A compromised IPC child process can escape the content sandbox and list the names of arbitrary files on the file system without user consent or interaction. This could result in exposure of private local files. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12365", "url": "https://www.suse.com/security/cve/CVE-2018-12365" }, { "category": "external", "summary": "SUSE Bug 1098998 for CVE-2018-12365", "url": "https://bugzilla.suse.com/1098998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12365" }, { "cve": "CVE-2018-12366", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12366" } ], "notes": [ { "category": "general", "text": "An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds read interpreted as a float value. This could leak private data into the output. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12366", "url": "https://www.suse.com/security/cve/CVE-2018-12366" }, { "category": "external", "summary": "SUSE Bug 1098998 for CVE-2018-12366", "url": "https://bugzilla.suse.com/1098998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12366" }, { "cve": "CVE-2018-5156", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5156" } ], "notes": [ { "category": "general", "text": "A vulnerability can occur when capturing a media stream when the media source type is changed as the capture is occurring. This can result in stream data being cast to the wrong type causing a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5156", "url": "https://www.suse.com/security/cve/CVE-2018-5156" }, { "category": "external", "summary": "SUSE Bug 1098998 for CVE-2018-5156", "url": "https://bugzilla.suse.com/1098998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-5156" }, { "cve": "CVE-2018-5188", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5188" } ], "notes": [ { "category": "general", "text": "Memory safety bugs present in Firefox 60, Firefox ESR 60, and Firefox ESR 52.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5188", "url": "https://www.suse.com/security/cve/CVE-2018-5188" }, { "category": "external", "summary": "SUSE Bug 1098998 for CVE-2018-5188", "url": "https://bugzilla.suse.com/1098998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-dom-inspector-2.53.9.1-1.1.x86_64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.aarch64", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.ppc64le", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.s390x", "openSUSE Tumbleweed:seamonkey-irc-2.53.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-5188" } ] }
CVE-2008-1238 (GCVE-0-2008-1238)
Vulnerability from cvelistv5
Published
2008-03-27 10:00
Modified
2024-08-07 08:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9, when generating the HTTP Referer header, does not list the entire URL when it contains Basic Authentication credentials without a username, which makes it easier for remote attackers to bypass application protection mechanisms that rely on Referer headers, such as with some Cross-Site Request Forgery (CSRF) mechanisms.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:17:33.580Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20080327 rPSA-2008-0128-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/490196/100/0/threaded" }, { "name": "29541", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29541" }, { "name": "29539", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29539" }, { "name": "1019703", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019703" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30620" }, { "name": "29560", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29560" }, { "name": "DSA-1532", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1532" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "USN-592-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-592-1" }, { "name": "29616", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29616" }, { "name": "29550", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29550" }, { "name": "29645", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29645" }, { "name": "29607", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29607" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "29558", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29558" }, { "name": "oval:org.mitre.oval:def:9889", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9889" }, { "name": "RHSA-2008:0208", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0208.html" }, { "name": "29526", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29526" }, { "name": "SUSE-SA:2008:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html" }, { "name": "TA08-087A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087A.html" }, { "name": "29391", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29391" }, { "name": "RHSA-2008:0209", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0209.html" }, { "name": "28448", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28448" }, { "name": "RHSA-2008:0207", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0207.html" }, { "name": "mozilla-http-referrer-spoofing(41449)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41449" }, { "name": "DSA-1534", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1534" }, { "name": "29547", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29547" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://sla.ckers.org/forum/read.php?10%2C20033" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128" }, { "name": "ADV-2008-0998", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0998/references" }, { "name": "DSA-1535", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1535" }, { "name": "MDVSA-2008:080", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:080" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-16.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-01-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9, when generating the HTTP Referer header, does not list the entire URL when it contains Basic Authentication credentials without a username, which makes it easier for remote attackers to bypass application protection mechanisms that rely on Referer headers, such as with some Cross-Site Request Forgery (CSRF) mechanisms." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "20080327 rPSA-2008-0128-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/490196/100/0/threaded" }, { "name": "29541", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29541" }, { "name": "29539", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29539" }, { "name": "1019703", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019703" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30620" }, { "name": "29560", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29560" }, { "name": "DSA-1532", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1532" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "USN-592-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-592-1" }, { "name": "29616", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29616" }, { "name": "29550", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29550" }, { "name": "29645", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29645" }, { "name": "29607", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29607" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "29558", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29558" }, { "name": "oval:org.mitre.oval:def:9889", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9889" }, { "name": "RHSA-2008:0208", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0208.html" }, { "name": "29526", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29526" }, { "name": "SUSE-SA:2008:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html" }, { "name": "TA08-087A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087A.html" }, { "name": "29391", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29391" }, { "name": "RHSA-2008:0209", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0209.html" }, { "name": "28448", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28448" }, { "name": "RHSA-2008:0207", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0207.html" }, { "name": "mozilla-http-referrer-spoofing(41449)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41449" }, { "name": "DSA-1534", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1534" }, { "name": "29547", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29547" }, { "tags": [ "x_refsource_MISC" ], "url": "http://sla.ckers.org/forum/read.php?10%2C20033" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128" }, { "name": "ADV-2008-0998", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0998/references" }, { "name": "DSA-1535", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1535" }, { "name": "MDVSA-2008:080", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:080" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-16.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-1238", "datePublished": "2008-03-27T10:00:00", "dateReserved": "2008-03-10T00:00:00", "dateUpdated": "2024-08-07T08:17:33.580Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-1233 (GCVE-0-2008-1233)
Vulnerability from cvelistv5
Published
2008-03-27 10:00
Modified
2024-08-07 08:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via "XPCNativeWrapper pollution."
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:17:34.258Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20080327 rPSA-2008-0128-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/490196/100/0/threaded" }, { "name": "29541", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29541" }, { "name": "29539", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29539" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-14.html" }, { "name": "ADV-2008-0999", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0999/references" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30620" }, { "name": "29560", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29560" }, { "name": "mozilla-settimeout-code-execution(41443)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41443" }, { "name": "oval:org.mitre.oval:def:11078", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11078" }, { "name": "DSA-1532", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1532" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "USN-592-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-592-1" }, { "name": "29616", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29616" }, { "name": "1019694", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019694" }, { "name": "29550", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29550" }, { "name": "29645", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29645" }, { "name": "USN-605-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-605-1" }, { "name": "29607", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29607" }, { "name": "239546", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1" }, { "name": "MDVSA-2008:155", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:155" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "DSA-1574", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1574" }, { "name": "29558", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29558" }, { "name": "29548", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29548" }, { "name": "30370", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30370" }, { "name": "RHSA-2008:0208", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0208.html" }, { "name": "29526", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29526" }, { "name": "ADV-2008-2091", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2091/references" }, { "name": "SUSE-SA:2008:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html" }, { "name": "TA08-087A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087A.html" }, { "name": "29391", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29391" }, { "name": "30192", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30192" }, { "name": "VU#466521", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/466521" }, { "name": "SSA:2008-128-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.447313" }, { "name": "RHSA-2008:0209", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0209.html" }, { "name": "28448", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28448" }, { "name": "RHSA-2008:0207", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0207.html" }, { "name": "30016", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30016" }, { "name": "DSA-1534", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1534" }, { "name": "FEDORA-2008-3519", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html" }, { "name": "29547", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29547" }, { "name": "30105", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30105" }, { "name": "30094", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30094" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128" }, { "name": "31043", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31043" }, { "name": "FEDORA-2008-3557", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html" }, { "name": "ADV-2008-0998", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0998/references" }, { "name": "DSA-1535", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1535" }, { "name": "MDVSA-2008:080", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:080" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via \"XPCNativeWrapper pollution.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "20080327 rPSA-2008-0128-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/490196/100/0/threaded" }, { "name": "29541", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29541" }, { "name": "29539", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29539" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-14.html" }, { "name": "ADV-2008-0999", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0999/references" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30620" }, { "name": "29560", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29560" }, { "name": "mozilla-settimeout-code-execution(41443)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41443" }, { "name": "oval:org.mitre.oval:def:11078", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11078" }, { "name": "DSA-1532", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1532" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "USN-592-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-592-1" }, { "name": "29616", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29616" }, { "name": "1019694", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019694" }, { "name": "29550", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29550" }, { "name": "29645", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29645" }, { "name": "USN-605-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-605-1" }, { "name": "29607", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29607" }, { "name": "239546", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1" }, { "name": "MDVSA-2008:155", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:155" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "DSA-1574", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1574" }, { "name": "29558", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29558" }, { "name": "29548", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29548" }, { "name": "30370", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30370" }, { "name": "RHSA-2008:0208", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0208.html" }, { "name": "29526", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29526" }, { "name": "ADV-2008-2091", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2091/references" }, { "name": "SUSE-SA:2008:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html" }, { "name": "TA08-087A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087A.html" }, { "name": "29391", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29391" }, { "name": "30192", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30192" }, { "name": "VU#466521", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/466521" }, { "name": "SSA:2008-128-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.447313" }, { "name": "RHSA-2008:0209", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0209.html" }, { "name": "28448", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28448" }, { "name": "RHSA-2008:0207", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0207.html" }, { "name": "30016", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30016" }, { "name": "DSA-1534", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1534" }, { "name": "FEDORA-2008-3519", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html" }, { "name": "29547", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29547" }, { "name": "30105", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30105" }, { "name": "30094", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30094" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128" }, { "name": "31043", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31043" }, { "name": "FEDORA-2008-3557", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html" }, { "name": "ADV-2008-0998", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0998/references" }, { "name": "DSA-1535", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1535" }, { "name": "MDVSA-2008:080", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:080" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-1233", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via \"XPCNativeWrapper pollution.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20080327 rPSA-2008-0128-1 firefox", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/490196/100/0/threaded" }, { "name": "29541", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29541" }, { "name": "29539", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29539" }, { "name": "http://www.mozilla.org/security/announce/2008/mfsa2008-14.html", "refsource": "CONFIRM", "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-14.html" }, { "name": "ADV-2008-0999", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0999/references" }, { "name": "30620", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30620" }, { "name": "29560", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29560" }, { "name": "mozilla-settimeout-code-execution(41443)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41443" }, { "name": "oval:org.mitre.oval:def:11078", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11078" }, { "name": "DSA-1532", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1532" }, { "name": "30327", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "USN-592-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-592-1" }, { "name": "29616", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29616" }, { "name": "1019694", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019694" }, { "name": "29550", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29550" }, { "name": "29645", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29645" }, { "name": "USN-605-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-605-1" }, { "name": "29607", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29607" }, { "name": "239546", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1" }, { "name": "MDVSA-2008:155", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:155" }, { "name": "ADV-2008-1793", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "DSA-1574", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1574" }, { "name": "29558", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29558" }, { "name": "29548", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29548" }, { "name": "30370", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30370" }, { "name": "RHSA-2008:0208", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2008-0208.html" }, { "name": "29526", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29526" }, { "name": "ADV-2008-2091", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2091/references" }, { "name": "SUSE-SA:2008:019", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html" }, { "name": "TA08-087A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-087A.html" }, { "name": "29391", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29391" }, { "name": "30192", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30192" }, { "name": "VU#466521", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/466521" }, { "name": "SSA:2008-128-02", "refsource": "SLACKWARE", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.447313" }, { "name": "RHSA-2008:0209", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0209.html" }, { "name": "28448", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28448" }, { "name": "RHSA-2008:0207", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0207.html" }, { "name": "30016", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30016" }, { "name": "DSA-1534", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1534" }, { "name": "FEDORA-2008-3519", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html" }, { "name": "29547", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29547" }, { "name": "30105", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30105" }, { "name": "30094", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30094" }, { "name": "GLSA-200805-18", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128" }, { "name": "31043", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31043" }, { "name": "FEDORA-2008-3557", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html" }, { "name": "ADV-2008-0998", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0998/references" }, { "name": "DSA-1535", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1535" }, { "name": "MDVSA-2008:080", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:080" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-1233", "datePublished": "2008-03-27T10:00:00", "dateReserved": "2008-03-10T00:00:00", "dateUpdated": "2024-08-07T08:17:34.258Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-12363 (GCVE-0-2018-12363)
Vulnerability from cvelistv5
Published
2018-10-18 13:00
Modified
2024-08-05 08:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Use-after-free when appending DOM nodes
Summary
A use-after-free vulnerability can occur when script uses mutation events to move DOM nodes between documents, resulting in the old document that held the node being freed but the node still having a pointer referencing it. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Mozilla | Thunderbird |
Version: unspecified < 60 Version: unspecified < 52.9 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.771Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201810-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "GLSA-201811-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201811-13" }, { "name": "DSA-4235", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4235" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "name": "RHSA-2018:2113", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "DSA-4244", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4244" }, { "name": "104560", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104560" }, { "name": "1041193", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041193" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3705-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1464784" }, { "name": "USN-3714-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Thunderbird", "vendor": "Mozilla", "versions": [ { "lessThan": "60", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "52.9", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Firefox ESR", "vendor": "Mozilla", "versions": [ { "lessThan": "60.1", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "52.9", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Firefox", "vendor": "Mozilla", "versions": [ { "lessThan": "61", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-06-26T00:00:00", "descriptions": [ { "lang": "en", "value": "A use-after-free vulnerability can occur when script uses mutation events to move DOM nodes between documents, resulting in the old document that held the node being freed but the node still having a pointer referencing it. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61." } ], "problemTypes": [ { "descriptions": [ { "description": "Use-after-free when appending DOM nodes", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-25T10:57:01", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "name": "GLSA-201810-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "GLSA-201811-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201811-13" }, { "name": "DSA-4235", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4235" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "name": "RHSA-2018:2113", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "DSA-4244", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4244" }, { "name": "104560", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104560" }, { "name": "1041193", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041193" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3705-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1464784" }, { "name": "USN-3714-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2018-12363", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Thunderbird", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "60" }, { "version_affected": "\u003c", "version_value": "52.9" } ] } }, { "product_name": "Firefox ESR", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "60.1" }, { "version_affected": "\u003c", "version_value": "52.9" } ] } }, { "product_name": "Firefox", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "61" } ] } } ] }, "vendor_name": "Mozilla" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A use-after-free vulnerability can occur when script uses mutation events to move DOM nodes between documents, resulting in the old document that held the node being freed but the node still having a pointer referencing it. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use-after-free when appending DOM nodes" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201810-01", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-01" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-15/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "GLSA-201811-13", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201811-13" }, { "name": "DSA-4235", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4235" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-18/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "name": "RHSA-2018:2113", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-16/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "DSA-4244", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4244" }, { "name": "104560", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104560" }, { "name": "1041193", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041193" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-19/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-17/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1464784", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1464784" }, { "name": "USN-3714-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2018-12363", "datePublished": "2018-10-18T13:00:00", "dateReserved": "2018-06-14T00:00:00", "dateUpdated": "2024-08-05T08:30:59.771Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-12365 (GCVE-0-2018-12365)
Vulnerability from cvelistv5
Published
2018-10-18 13:00
Modified
2024-08-05 08:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Compromised IPC child process can list local filenames
Summary
A compromised IPC child process can escape the content sandbox and list the names of arbitrary files on the file system without user consent or interaction. This could result in exposure of private local files. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Mozilla | Thunderbird |
Version: unspecified < 60 Version: unspecified < 52.9 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.980Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201810-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "GLSA-201811-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201811-13" }, { "name": "DSA-4235", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4235" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1459206" }, { "name": "RHSA-2018:2113", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "DSA-4244", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4244" }, { "name": "104560", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104560" }, { "name": "1041193", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041193" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "USN-3714-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Thunderbird", "vendor": "Mozilla", "versions": [ { "lessThan": "60", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "52.9", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Firefox ESR", "vendor": "Mozilla", "versions": [ { "lessThan": "60.1", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "52.9", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Firefox", "vendor": "Mozilla", "versions": [ { "lessThan": "61", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-06-26T00:00:00", "descriptions": [ { "lang": "en", "value": "A compromised IPC child process can escape the content sandbox and list the names of arbitrary files on the file system without user consent or interaction. This could result in exposure of private local files. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61." } ], "problemTypes": [ { "descriptions": [ { "description": "Compromised IPC child process can list local filenames", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-25T10:57:01", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "name": "GLSA-201810-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "GLSA-201811-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201811-13" }, { "name": "DSA-4235", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4235" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1459206" }, { "name": "RHSA-2018:2113", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "DSA-4244", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4244" }, { "name": "104560", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104560" }, { "name": "1041193", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041193" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "USN-3714-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2018-12365", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Thunderbird", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "60" }, { "version_affected": "\u003c", "version_value": "52.9" } ] } }, { "product_name": "Firefox ESR", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "60.1" }, { "version_affected": "\u003c", "version_value": "52.9" } ] } }, { "product_name": "Firefox", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "61" } ] } } ] }, "vendor_name": "Mozilla" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A compromised IPC child process can escape the content sandbox and list the names of arbitrary files on the file system without user consent or interaction. This could result in exposure of private local files. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Compromised IPC child process can list local filenames" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201810-01", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-01" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-15/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "GLSA-201811-13", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201811-13" }, { "name": "DSA-4235", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4235" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-18/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1459206", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1459206" }, { "name": "RHSA-2018:2113", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-16/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "DSA-4244", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4244" }, { "name": "104560", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104560" }, { "name": "1041193", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041193" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-19/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-17/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "USN-3714-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2018-12365", "datePublished": "2018-10-18T13:00:00", "dateReserved": "2018-06-14T00:00:00", "dateUpdated": "2024-08-05T08:30:59.980Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-0419 (GCVE-0-2008-0419)
Vulnerability from cvelistv5
Published
2008-02-08 21:00
Modified
2024-08-07 07:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows remote attackers to steal navigation history and cause a denial of service (crash) via images in a page that uses designMode frames, which triggers memory corruption related to resize handles.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:46:54.282Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2008:0104", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0104.html" }, { "name": "USN-576-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-576-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://browser.netscape.com/releasenotes/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=400556" }, { "name": "28939", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28939" }, { "name": "DSA-1506", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1506" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1995" }, { "name": "FEDORA-2008-2118", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html" }, { "name": "FEDORA-2008-2060", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093" }, { "name": "28766", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28766" }, { "name": "28818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28818" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30620" }, { "name": "28865", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28865" }, { "name": "29049", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29049" }, { "name": "ADV-2008-0453", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0453/references" }, { "name": "RHSA-2008:0103", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0103.html" }, { "name": "28877", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28877" }, { "name": "28879", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28879" }, { "name": "29167", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29167" }, { "name": "29567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29567" }, { "name": "RHSA-2008:0105", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0105.html" }, { "name": "28958", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28958" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "20080229 rPSA-2008-0093-1 thunderbird", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/488971/100/0/threaded" }, { "name": "DSA-1489", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1489" }, { "name": "20080212 FLEA-2008-0001-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/488002/100/0/threaded" }, { "name": "20080209 rPSA-2008-0051-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487826/100/0/threaded" }, { "name": "29086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29086" }, { "name": "28815", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28815" }, { "name": "28864", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28864" }, { "name": "DSA-1485", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1485" }, { "name": "28924", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28924" }, { "name": "27683", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27683" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-06.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0093" }, { "name": "oval:org.mitre.oval:def:11652", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11652" }, { "name": "SUSE-SA:2008:008", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html" }, { "name": "VU#879056", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/879056" }, { "name": "FEDORA-2008-1459", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html" }, { "name": "29164", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29164" }, { "name": "FEDORA-2008-1535", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0051" }, { "name": "1019328", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019328" }, { "name": "DSA-1484", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1484" }, { "name": "28808", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28808" }, { "name": "ADV-2008-0627", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0627/references" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "name": "28754", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28754" }, { "name": "28758", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28758" }, { "name": "FEDORA-2008-1435", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html" }, { "name": "MDVSA-2008:048", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:048" }, { "name": "28839", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28839" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows remote attackers to steal navigation history and cause a denial of service (crash) via images in a page that uses designMode frames, which triggers memory corruption related to resize handles." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2008:0104", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0104.html" }, { "name": "USN-576-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-576-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://browser.netscape.com/releasenotes/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=400556" }, { "name": "28939", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28939" }, { "name": "DSA-1506", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1506" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1995" }, { "name": "FEDORA-2008-2118", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html" }, { "name": "FEDORA-2008-2060", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093" }, { "name": "28766", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28766" }, { "name": "28818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28818" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30620" }, { "name": "28865", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28865" }, { "name": "29049", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29049" }, { "name": "ADV-2008-0453", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0453/references" }, { "name": "RHSA-2008:0103", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0103.html" }, { "name": "28877", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28877" }, { "name": "28879", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28879" }, { "name": "29167", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29167" }, { "name": "29567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29567" }, { "name": "RHSA-2008:0105", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0105.html" }, { "name": "28958", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28958" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "20080229 rPSA-2008-0093-1 thunderbird", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/488971/100/0/threaded" }, { "name": "DSA-1489", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1489" }, { "name": "20080212 FLEA-2008-0001-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/488002/100/0/threaded" }, { "name": "20080209 rPSA-2008-0051-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487826/100/0/threaded" }, { "name": "29086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29086" }, { "name": "28815", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28815" }, { "name": "28864", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28864" }, { "name": "DSA-1485", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1485" }, { "name": "28924", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28924" }, { "name": "27683", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27683" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-06.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0093" }, { "name": "oval:org.mitre.oval:def:11652", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11652" }, { "name": "SUSE-SA:2008:008", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html" }, { "name": "VU#879056", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/879056" }, { "name": "FEDORA-2008-1459", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html" }, { "name": "29164", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29164" }, { "name": "FEDORA-2008-1535", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0051" }, { "name": "1019328", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019328" }, { "name": "DSA-1484", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1484" }, { "name": "28808", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28808" }, { "name": "ADV-2008-0627", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0627/references" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "name": "28754", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28754" }, { "name": "28758", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28758" }, { "name": "FEDORA-2008-1435", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html" }, { "name": "MDVSA-2008:048", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:048" }, { "name": "28839", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28839" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-0419", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows remote attackers to steal navigation history and cause a denial of service (crash) via images in a page that uses designMode frames, which triggers memory corruption related to resize handles." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2008:0104", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0104.html" }, { "name": "USN-576-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-576-1" }, { "name": "http://browser.netscape.com/releasenotes/", "refsource": "CONFIRM", "url": "http://browser.netscape.com/releasenotes/" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=400556", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=400556" }, { "name": "28939", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28939" }, { "name": "DSA-1506", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1506" }, { "name": "https://issues.rpath.com/browse/RPL-1995", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1995" }, { "name": "FEDORA-2008-2118", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html" }, { "name": "FEDORA-2008-2060", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093" }, { "name": "28766", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28766" }, { "name": "28818", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28818" }, { "name": "30620", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30620" }, { "name": "28865", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28865" }, { "name": "29049", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29049" }, { "name": "ADV-2008-0453", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0453/references" }, { "name": "RHSA-2008:0103", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0103.html" }, { "name": "28877", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28877" }, { "name": "28879", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28879" }, { "name": "29167", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29167" }, { "name": "29567", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29567" }, { "name": "RHSA-2008:0105", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0105.html" }, { "name": "28958", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28958" }, { "name": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html", "refsource": "CONFIRM", "url": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html" }, { "name": "30327", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "20080229 rPSA-2008-0093-1 thunderbird", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/488971/100/0/threaded" }, { "name": "DSA-1489", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1489" }, { "name": "20080212 FLEA-2008-0001-1 firefox", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/488002/100/0/threaded" }, { "name": "20080209 rPSA-2008-0051-1 firefox", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487826/100/0/threaded" }, { "name": "29086", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29086" }, { "name": "28815", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28815" }, { "name": "28864", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28864" }, { "name": "DSA-1485", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1485" }, { "name": "28924", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28924" }, { "name": "27683", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27683" }, { "name": "ADV-2008-1793", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "http://www.mozilla.org/security/announce/2008/mfsa2008-06.html", "refsource": "CONFIRM", "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-06.html" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2008-0093", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0093" }, { "name": "oval:org.mitre.oval:def:11652", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11652" }, { "name": "SUSE-SA:2008:008", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html" }, { "name": "VU#879056", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/879056" }, { "name": "FEDORA-2008-1459", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html" }, { "name": "29164", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29164" }, { "name": "FEDORA-2008-1535", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2008-0051", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0051" }, { "name": "1019328", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019328" }, { "name": "DSA-1484", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1484" }, { "name": "28808", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28808" }, { "name": "ADV-2008-0627", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0627/references" }, { "name": "GLSA-200805-18", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "name": "28754", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28754" }, { "name": "28758", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28758" }, { "name": "FEDORA-2008-1435", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html" }, { "name": "MDVSA-2008:048", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:048" }, { "name": "28839", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28839" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-0419", "datePublished": "2008-02-08T21:00:00", "dateReserved": "2008-01-23T00:00:00", "dateUpdated": "2024-08-07T07:46:54.282Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-0412 (GCVE-0-2008-0412)
Vulnerability from cvelistv5
Published
2008-02-08 21:00
Modified
2024-08-07 07:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The browser engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to the (1) nsTableFrame::GetFrameAtOrBefore, (2) nsAccessibilityService::GetAccessible, (3) nsBindingManager::GetNestedInsertionPoint, (4) nsXBLPrototypeBinding::AttributeChanged, (5) nsColumnSetFrame::GetContentInsertionFrame, and (6) nsLineLayout::TrimTrailingWhiteSpaceIn methods, and other vectors.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:46:54.820Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2008:0104", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0104.html" }, { "name": "USN-582-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-582-2" }, { "name": "USN-576-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-576-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://browser.netscape.com/releasenotes/" }, { "name": "28939", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28939" }, { "name": "DSA-1506", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1506" }, { "name": "SSA:2008-061-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.445399" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1995" }, { "name": "FEDORA-2008-2118", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html" }, { "name": "FEDORA-2008-2060", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093" }, { "name": "28766", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28766" }, { "name": "28818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28818" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30620" }, { "name": "28865", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28865" }, { "name": "29049", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29049" }, { "name": "ADV-2008-0453", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0453/references" }, { "name": "RHSA-2008:0103", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0103.html" }, { "name": "28877", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28877" }, { "name": "28879", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28879" }, { "name": "USN-582-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-582-1" }, { "name": "29167", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29167" }, { "name": "29567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29567" }, { "name": "RHSA-2008:0105", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0105.html" }, { "name": "28958", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28958" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "20080229 rPSA-2008-0093-1 thunderbird", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/488971/100/0/threaded" }, { "name": "DSA-1489", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1489" }, { "name": "20080212 FLEA-2008-0001-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/488002/100/0/threaded" }, { "name": "20080209 rPSA-2008-0051-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487826/100/0/threaded" }, { "name": "29086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29086" }, { "name": "28815", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28815" }, { "name": "ADV-2008-0454", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0454/references" }, { "name": "239546", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1" }, { "name": "28864", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28864" }, { "name": "DSA-1485", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1485" }, { "name": "28924", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28924" }, { "name": "27683", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27683" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "1019320", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019320" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-01.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0093" }, { "name": "ADV-2008-2091", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2091/references" }, { "name": "SUSE-SA:2008:008", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=398088%2C393141%2C364801%2C346405%2C396613%2C394337%2C406290" }, { "name": "FEDORA-2008-1459", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html" }, { "name": "29164", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29164" }, { "name": "29211", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29211" }, { "name": "FEDORA-2008-1535", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0051" }, { "name": "MDVSA-2008:062", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:062" }, { "name": "DSA-1484", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1484" }, { "name": "28808", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28808" }, { "name": "ADV-2008-0627", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0627/references" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "name": "oval:org.mitre.oval:def:10573", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10573" }, { "name": "28754", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28754" }, { "name": "28758", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28758" }, { "name": "FEDORA-2008-1435", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html" }, { "name": "MDVSA-2008:048", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:048" }, { "name": "31043", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31043" }, { "name": "29098", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29098" }, { "name": "28839", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28839" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The browser engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to the (1) nsTableFrame::GetFrameAtOrBefore, (2) nsAccessibilityService::GetAccessible, (3) nsBindingManager::GetNestedInsertionPoint, (4) nsXBLPrototypeBinding::AttributeChanged, (5) nsColumnSetFrame::GetContentInsertionFrame, and (6) nsLineLayout::TrimTrailingWhiteSpaceIn methods, and other vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2008:0104", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0104.html" }, { "name": "USN-582-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-582-2" }, { "name": "USN-576-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-576-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://browser.netscape.com/releasenotes/" }, { "name": "28939", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28939" }, { "name": "DSA-1506", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1506" }, { "name": "SSA:2008-061-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.445399" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1995" }, { "name": "FEDORA-2008-2118", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html" }, { "name": "FEDORA-2008-2060", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093" }, { "name": "28766", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28766" }, { "name": "28818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28818" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30620" }, { "name": "28865", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28865" }, { "name": "29049", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29049" }, { "name": "ADV-2008-0453", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0453/references" }, { "name": "RHSA-2008:0103", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0103.html" }, { "name": "28877", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28877" }, { "name": "28879", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28879" }, { "name": "USN-582-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-582-1" }, { "name": "29167", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29167" }, { "name": "29567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29567" }, { "name": "RHSA-2008:0105", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0105.html" }, { "name": "28958", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28958" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "20080229 rPSA-2008-0093-1 thunderbird", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/488971/100/0/threaded" }, { "name": "DSA-1489", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1489" }, { "name": "20080212 FLEA-2008-0001-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/488002/100/0/threaded" }, { "name": "20080209 rPSA-2008-0051-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487826/100/0/threaded" }, { "name": "29086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29086" }, { "name": "28815", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28815" }, { "name": "ADV-2008-0454", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0454/references" }, { "name": "239546", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1" }, { "name": "28864", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28864" }, { "name": "DSA-1485", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1485" }, { "name": "28924", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28924" }, { "name": "27683", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27683" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "1019320", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019320" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-01.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0093" }, { "name": "ADV-2008-2091", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2091/references" }, { "name": "SUSE-SA:2008:008", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=398088%2C393141%2C364801%2C346405%2C396613%2C394337%2C406290" }, { "name": "FEDORA-2008-1459", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html" }, { "name": "29164", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29164" }, { "name": "29211", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29211" }, { "name": "FEDORA-2008-1535", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0051" }, { "name": "MDVSA-2008:062", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:062" }, { "name": "DSA-1484", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1484" }, { "name": "28808", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28808" }, { "name": "ADV-2008-0627", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0627/references" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "name": "oval:org.mitre.oval:def:10573", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10573" }, { "name": "28754", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28754" }, { "name": "28758", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28758" }, { "name": "FEDORA-2008-1435", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html" }, { "name": "MDVSA-2008:048", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:048" }, { "name": "31043", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31043" }, { "name": "29098", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29098" }, { "name": "28839", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28839" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-0412", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The browser engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to the (1) nsTableFrame::GetFrameAtOrBefore, (2) nsAccessibilityService::GetAccessible, (3) nsBindingManager::GetNestedInsertionPoint, (4) nsXBLPrototypeBinding::AttributeChanged, (5) nsColumnSetFrame::GetContentInsertionFrame, and (6) nsLineLayout::TrimTrailingWhiteSpaceIn methods, and other vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2008:0104", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0104.html" }, { "name": "USN-582-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-582-2" }, { "name": "USN-576-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-576-1" }, { "name": "http://browser.netscape.com/releasenotes/", "refsource": "CONFIRM", "url": "http://browser.netscape.com/releasenotes/" }, { "name": "28939", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28939" }, { "name": "DSA-1506", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1506" }, { "name": "SSA:2008-061-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.445399" }, { "name": "https://issues.rpath.com/browse/RPL-1995", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1995" }, { "name": "FEDORA-2008-2118", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html" }, { "name": "FEDORA-2008-2060", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093" }, { "name": "28766", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28766" }, { "name": "28818", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28818" }, { "name": "30620", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30620" }, { "name": "28865", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28865" }, { "name": "29049", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29049" }, { "name": "ADV-2008-0453", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0453/references" }, { "name": "RHSA-2008:0103", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0103.html" }, { "name": "28877", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28877" }, { "name": "28879", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28879" }, { "name": "USN-582-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-582-1" }, { "name": "29167", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29167" }, { "name": "29567", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29567" }, { "name": "RHSA-2008:0105", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0105.html" }, { "name": "28958", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28958" }, { "name": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html", "refsource": "CONFIRM", "url": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html" }, { "name": "30327", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "20080229 rPSA-2008-0093-1 thunderbird", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/488971/100/0/threaded" }, { "name": "DSA-1489", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1489" }, { "name": "20080212 FLEA-2008-0001-1 firefox", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/488002/100/0/threaded" }, { "name": "20080209 rPSA-2008-0051-1 firefox", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487826/100/0/threaded" }, { "name": "29086", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29086" }, { "name": "28815", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28815" }, { "name": "ADV-2008-0454", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0454/references" }, { "name": "239546", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1" }, { "name": "28864", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28864" }, { "name": "DSA-1485", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1485" }, { "name": "28924", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28924" }, { "name": "27683", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27683" }, { "name": "ADV-2008-1793", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "1019320", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019320" }, { "name": "http://www.mozilla.org/security/announce/2008/mfsa2008-01.html", "refsource": "CONFIRM", "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-01.html" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2008-0093", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0093" }, { "name": "ADV-2008-2091", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2091/references" }, { "name": "SUSE-SA:2008:008", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html" }, { "name": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=398088,393141,364801,346405,396613,394337,406290", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=398088,393141,364801,346405,396613,394337,406290" }, { "name": "FEDORA-2008-1459", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html" }, { "name": "29164", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29164" }, { "name": "29211", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29211" }, { "name": "FEDORA-2008-1535", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2008-0051", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0051" }, { "name": "MDVSA-2008:062", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:062" }, { "name": "DSA-1484", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1484" }, { "name": "28808", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28808" }, { "name": "ADV-2008-0627", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0627/references" }, { "name": "GLSA-200805-18", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "name": "oval:org.mitre.oval:def:10573", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10573" }, { "name": "28754", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28754" }, { "name": "28758", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28758" }, { "name": "FEDORA-2008-1435", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html" }, { "name": "MDVSA-2008:048", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:048" }, { "name": "31043", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31043" }, { "name": "29098", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29098" }, { "name": "28839", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28839" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-0412", "datePublished": "2008-02-08T21:00:00", "dateReserved": "2008-01-23T00:00:00", "dateUpdated": "2024-08-07T07:46:54.820Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-0592 (GCVE-0-2008-0592)
Vulnerability from cvelistv5
Published
2008-02-08 23:00
Modified
2024-08-07 07:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to cause a denial of service via a plain .txt file with a "Content-Disposition: attachment" and an invalid "Content-Type: plain/text," which prevents Firefox from rendering future plain text files within the browser.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:54:22.462Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2008:0104", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0104.html" }, { "name": "USN-576-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-576-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://browser.netscape.com/releasenotes/" }, { "name": "28939", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28939" }, { "name": "DSA-1506", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1506" }, { "name": "FEDORA-2008-2118", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html" }, { "name": "FEDORA-2008-2060", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html" }, { "name": "28818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28818" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30620" }, { "name": "28865", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28865" }, { "name": "ADV-2008-0453", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0453/references" }, { "name": "oval:org.mitre.oval:def:9972", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9972" }, { "name": "RHSA-2008:0103", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0103.html" }, { "name": "28877", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28877" }, { "name": "28879", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28879" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=387258" }, { "name": "29167", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29167" }, { "name": "29567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29567" }, { "name": "RHSA-2008:0105", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0105.html" }, { "name": "28958", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28958" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "1019340", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019340" }, { "name": "DSA-1489", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1489" }, { "name": "20080212 FLEA-2008-0001-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/488002/100/0/threaded" }, { "name": "20080209 rPSA-2008-0051-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487826/100/0/threaded" }, { "name": "29086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29086" }, { "name": "28864", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28864" }, { "name": "DSA-1485", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1485" }, { "name": "28924", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28924" }, { "name": "27683", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27683" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "SUSE-SA:2008:008", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html" }, { "name": "FEDORA-2008-1459", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html" }, { "name": "FEDORA-2008-1535", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0051" }, { "name": "DSA-1484", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1484" }, { "name": "ADV-2008-0627", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0627/references" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-09.html" }, { "name": "28754", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28754" }, { "name": "FEDORA-2008-1435", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html" }, { "name": "MDVSA-2008:048", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:048" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to cause a denial of service via a plain .txt file with a \"Content-Disposition: attachment\" and an invalid \"Content-Type: plain/text,\" which prevents Firefox from rendering future plain text files within the browser." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2008:0104", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0104.html" }, { "name": "USN-576-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-576-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://browser.netscape.com/releasenotes/" }, { "name": "28939", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28939" }, { "name": "DSA-1506", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1506" }, { "name": "FEDORA-2008-2118", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html" }, { "name": "FEDORA-2008-2060", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html" }, { "name": "28818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28818" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30620" }, { "name": "28865", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28865" }, { "name": "ADV-2008-0453", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0453/references" }, { "name": "oval:org.mitre.oval:def:9972", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9972" }, { "name": "RHSA-2008:0103", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0103.html" }, { "name": "28877", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28877" }, { "name": "28879", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28879" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=387258" }, { "name": "29167", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29167" }, { "name": "29567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29567" }, { "name": "RHSA-2008:0105", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0105.html" }, { "name": "28958", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28958" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "1019340", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019340" }, { "name": "DSA-1489", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1489" }, { "name": "20080212 FLEA-2008-0001-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/488002/100/0/threaded" }, { "name": "20080209 rPSA-2008-0051-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487826/100/0/threaded" }, { "name": "29086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29086" }, { "name": "28864", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28864" }, { "name": "DSA-1485", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1485" }, { "name": "28924", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28924" }, { "name": "27683", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27683" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "SUSE-SA:2008:008", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html" }, { "name": "FEDORA-2008-1459", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html" }, { "name": "FEDORA-2008-1535", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0051" }, { "name": "DSA-1484", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1484" }, { "name": "ADV-2008-0627", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0627/references" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-09.html" }, { "name": "28754", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28754" }, { "name": "FEDORA-2008-1435", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html" }, { "name": "MDVSA-2008:048", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:048" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-0592", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to cause a denial of service via a plain .txt file with a \"Content-Disposition: attachment\" and an invalid \"Content-Type: plain/text,\" which prevents Firefox from rendering future plain text files within the browser." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2008:0104", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0104.html" }, { "name": "USN-576-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-576-1" }, { "name": "http://browser.netscape.com/releasenotes/", "refsource": "CONFIRM", "url": "http://browser.netscape.com/releasenotes/" }, { "name": "28939", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28939" }, { "name": "DSA-1506", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1506" }, { "name": "FEDORA-2008-2118", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html" }, { "name": "FEDORA-2008-2060", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html" }, { "name": "28818", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28818" }, { "name": "30620", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30620" }, { "name": "28865", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28865" }, { "name": "ADV-2008-0453", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0453/references" }, { "name": "oval:org.mitre.oval:def:9972", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9972" }, { "name": "RHSA-2008:0103", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0103.html" }, { "name": "28877", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28877" }, { "name": "28879", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28879" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=387258", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=387258" }, { "name": "29167", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29167" }, { "name": "29567", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29567" }, { "name": "RHSA-2008:0105", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0105.html" }, { "name": "28958", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28958" }, { "name": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html", "refsource": "CONFIRM", "url": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html" }, { "name": "30327", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "1019340", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019340" }, { "name": "DSA-1489", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1489" }, { "name": "20080212 FLEA-2008-0001-1 firefox", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/488002/100/0/threaded" }, { "name": "20080209 rPSA-2008-0051-1 firefox", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487826/100/0/threaded" }, { "name": "29086", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29086" }, { "name": "28864", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28864" }, { "name": "DSA-1485", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1485" }, { "name": "28924", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28924" }, { "name": "27683", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27683" }, { "name": "ADV-2008-1793", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "SUSE-SA:2008:008", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html" }, { "name": "FEDORA-2008-1459", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html" }, { "name": "FEDORA-2008-1535", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2008-0051", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0051" }, { "name": "DSA-1484", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1484" }, { "name": "ADV-2008-0627", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0627/references" }, { "name": "GLSA-200805-18", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "name": "http://www.mozilla.org/security/announce/2008/mfsa2008-09.html", "refsource": "CONFIRM", "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-09.html" }, { "name": "28754", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28754" }, { "name": "FEDORA-2008-1435", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html" }, { "name": "MDVSA-2008:048", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:048" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-0592", "datePublished": "2008-02-08T23:00:00", "dateReserved": "2008-02-05T00:00:00", "dateUpdated": "2024-08-07T07:54:22.462Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-0418 (GCVE-0-2008-0418)
Vulnerability from cvelistv5
Published
2008-02-08 21:00
Modified
2024-08-07 07:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Directory traversal vulnerability in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8, when using "flat" addons, allows remote attackers to read arbitrary Javascript, image, and stylesheet files via the chrome: URI scheme, as demonstrated by stealing session information from sessionstore.js.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:46:54.336Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2008:0104", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0104.html" }, { "name": "USN-582-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-582-2" }, { "name": "1019329", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019329" }, { "name": "USN-576-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-576-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://browser.netscape.com/releasenotes/" }, { "name": "28939", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28939" }, { "name": "DSA-1506", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1506" }, { "name": "VU#309608", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/309608" }, { "name": "SSA:2008-061-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.445399" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1995" }, { "name": "FEDORA-2008-2118", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html" }, { "name": "FEDORA-2008-2060", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093" }, { "name": "28766", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28766" }, { "name": "28622", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28622/" }, { "name": "28818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28818" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30620" }, { "name": "28865", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28865" }, { "name": "29049", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29049" }, { "name": "ADV-2008-0453", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0453/references" }, { "name": "RHSA-2008:0103", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0103.html" }, { "name": "28877", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28877" }, { "name": "28879", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28879" }, { "name": "USN-582-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-582-1" }, { "name": "29167", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29167" }, { "name": "29567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29567" }, { "name": "RHSA-2008:0105", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0105.html" }, { "name": "28958", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28958" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "20080229 rPSA-2008-0093-1 thunderbird", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/488971/100/0/threaded" }, { "name": "DSA-1489", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1489" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-05.html" }, { "name": "20080212 FLEA-2008-0001-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/488002/100/0/threaded" }, { "name": "20080209 rPSA-2008-0051-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487826/100/0/threaded" }, { "name": "29086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29086" }, { "name": "28815", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28815" }, { "name": "ADV-2008-0454", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0454/references" }, { "name": "239546", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1" }, { "name": "28864", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28864" }, { "name": "DSA-1485", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1485" }, { "name": "28924", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28924" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0093" }, { "name": "ADV-2008-2091", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2091/references" }, { "name": "SUSE-SA:2008:008", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html" }, { "name": "FEDORA-2008-1459", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html" }, { "name": "29164", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29164" }, { "name": "29211", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29211" }, { "name": "FEDORA-2008-1535", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0051" }, { "name": "MDVSA-2008:062", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:062" }, { "name": "DSA-1484", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1484" }, { "name": "28808", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28808" }, { "name": "ADV-2008-0263", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0263" }, { "name": "oval:org.mitre.oval:def:10705", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10705" }, { "name": "ADV-2008-0627", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0627/references" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "name": "28754", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28754" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.hiredhacker.com/2008/01/19/firefox-chrome-url-handling-directory-traversal/" }, { "name": "27406", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27406" }, { "name": "FEDORA-2008-1435", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html" }, { "name": "MDVSA-2008:048", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:048" }, { "name": "31043", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31043" }, { "name": "29098", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29098" }, { "name": "28839", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28839" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8, when using \"flat\" addons, allows remote attackers to read arbitrary Javascript, image, and stylesheet files via the chrome: URI scheme, as demonstrated by stealing session information from sessionstore.js." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2008:0104", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0104.html" }, { "name": "USN-582-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-582-2" }, { "name": "1019329", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019329" }, { "name": "USN-576-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-576-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://browser.netscape.com/releasenotes/" }, { "name": "28939", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28939" }, { "name": "DSA-1506", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1506" }, { "name": "VU#309608", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/309608" }, { "name": "SSA:2008-061-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.445399" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1995" }, { "name": "FEDORA-2008-2118", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html" }, { "name": "FEDORA-2008-2060", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093" }, { "name": "28766", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28766" }, { "name": "28622", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28622/" }, { "name": "28818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28818" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30620" }, { "name": "28865", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28865" }, { "name": "29049", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29049" }, { "name": "ADV-2008-0453", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0453/references" }, { "name": "RHSA-2008:0103", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0103.html" }, { "name": "28877", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28877" }, { "name": "28879", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28879" }, { "name": "USN-582-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-582-1" }, { "name": "29167", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29167" }, { "name": "29567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29567" }, { "name": "RHSA-2008:0105", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0105.html" }, { "name": "28958", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28958" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "20080229 rPSA-2008-0093-1 thunderbird", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/488971/100/0/threaded" }, { "name": "DSA-1489", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1489" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-05.html" }, { "name": "20080212 FLEA-2008-0001-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/488002/100/0/threaded" }, { "name": "20080209 rPSA-2008-0051-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487826/100/0/threaded" }, { "name": "29086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29086" }, { "name": "28815", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28815" }, { "name": "ADV-2008-0454", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0454/references" }, { "name": "239546", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1" }, { "name": "28864", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28864" }, { "name": "DSA-1485", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1485" }, { "name": "28924", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28924" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0093" }, { "name": "ADV-2008-2091", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2091/references" }, { "name": "SUSE-SA:2008:008", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html" }, { "name": "FEDORA-2008-1459", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html" }, { "name": "29164", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29164" }, { "name": "29211", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29211" }, { "name": "FEDORA-2008-1535", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0051" }, { "name": "MDVSA-2008:062", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:062" }, { "name": "DSA-1484", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1484" }, { "name": "28808", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28808" }, { "name": "ADV-2008-0263", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0263" }, { "name": "oval:org.mitre.oval:def:10705", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10705" }, { "name": "ADV-2008-0627", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0627/references" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "name": "28754", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28754" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.hiredhacker.com/2008/01/19/firefox-chrome-url-handling-directory-traversal/" }, { "name": "27406", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27406" }, { "name": "FEDORA-2008-1435", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html" }, { "name": "MDVSA-2008:048", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:048" }, { "name": "31043", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31043" }, { "name": "29098", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29098" }, { "name": "28839", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28839" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-0418", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8, when using \"flat\" addons, allows remote attackers to read arbitrary Javascript, image, and stylesheet files via the chrome: URI scheme, as demonstrated by stealing session information from sessionstore.js." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2008:0104", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0104.html" }, { "name": "USN-582-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-582-2" }, { "name": "1019329", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019329" }, { "name": "USN-576-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-576-1" }, { "name": "http://browser.netscape.com/releasenotes/", "refsource": "CONFIRM", "url": "http://browser.netscape.com/releasenotes/" }, { "name": "28939", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28939" }, { "name": "DSA-1506", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1506" }, { "name": "VU#309608", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/309608" }, { "name": "SSA:2008-061-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.445399" }, { "name": "https://issues.rpath.com/browse/RPL-1995", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1995" }, { "name": "FEDORA-2008-2118", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html" }, { "name": "FEDORA-2008-2060", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093" }, { "name": "28766", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28766" }, { "name": "28622", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28622/" }, { "name": "28818", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28818" }, { "name": "30620", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30620" }, { "name": "28865", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28865" }, { "name": "29049", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29049" }, { "name": "ADV-2008-0453", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0453/references" }, { "name": "RHSA-2008:0103", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0103.html" }, { "name": "28877", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28877" }, { "name": "28879", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28879" }, { "name": "USN-582-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-582-1" }, { "name": "29167", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29167" }, { "name": "29567", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29567" }, { "name": "RHSA-2008:0105", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0105.html" }, { "name": "28958", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28958" }, { "name": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html", "refsource": "CONFIRM", "url": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html" }, { "name": "30327", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "20080229 rPSA-2008-0093-1 thunderbird", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/488971/100/0/threaded" }, { "name": "DSA-1489", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1489" }, { "name": "http://www.mozilla.org/security/announce/2008/mfsa2008-05.html", "refsource": "CONFIRM", "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-05.html" }, { "name": "20080212 FLEA-2008-0001-1 firefox", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/488002/100/0/threaded" }, { "name": "20080209 rPSA-2008-0051-1 firefox", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487826/100/0/threaded" }, { "name": "29086", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29086" }, { "name": "28815", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28815" }, { "name": "ADV-2008-0454", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0454/references" }, { "name": "239546", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1" }, { "name": "28864", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28864" }, { "name": "DSA-1485", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1485" }, { "name": "28924", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28924" }, { "name": "ADV-2008-1793", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2008-0093", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0093" }, { "name": "ADV-2008-2091", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2091/references" }, { "name": "SUSE-SA:2008:008", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html" }, { "name": "FEDORA-2008-1459", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html" }, { "name": "29164", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29164" }, { "name": "29211", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29211" }, { "name": "FEDORA-2008-1535", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2008-0051", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0051" }, { "name": "MDVSA-2008:062", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:062" }, { "name": "DSA-1484", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1484" }, { "name": "28808", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28808" }, { "name": "ADV-2008-0263", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0263" }, { "name": "oval:org.mitre.oval:def:10705", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10705" }, { "name": "ADV-2008-0627", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0627/references" }, { "name": "GLSA-200805-18", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "name": "28754", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28754" }, { "name": "http://www.hiredhacker.com/2008/01/19/firefox-chrome-url-handling-directory-traversal/", "refsource": "MISC", "url": "http://www.hiredhacker.com/2008/01/19/firefox-chrome-url-handling-directory-traversal/" }, { "name": "27406", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27406" }, { "name": "FEDORA-2008-1435", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html" }, { "name": "MDVSA-2008:048", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:048" }, { "name": "31043", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31043" }, { "name": "29098", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29098" }, { "name": "28839", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28839" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-0418", "datePublished": "2008-02-08T21:00:00", "dateReserved": "2008-01-23T00:00:00", "dateUpdated": "2024-08-07T07:46:54.336Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-1195 (GCVE-0-2008-1195)
Vulnerability from cvelistv5
Published
2008-03-06 21:00
Modified
2024-08-07 08:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in Sun JDK and Java Runtime Environment (JRE) 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to access arbitrary network services on the local host via unspecified vectors related to JavaScript and Java APIs.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:08:57.886Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20080327 rPSA-2008-0128-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/490196/100/0/threaded" }, { "name": "29541", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29541" }, { "name": "APPLE-SA-2008-09-24", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html" }, { "name": "30676", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30676" }, { "name": "RHSA-2008:0267", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0267.html" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30620" }, { "name": "29560", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29560" }, { "name": "SUSE-SA:2008:018", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.html" }, { "name": "233326", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-233326-1" }, { "name": "32018", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32018" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "29897", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29897" }, { "name": "29498", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29498" }, { "name": "USN-592-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-592-1" }, { "name": "oval:org.mitre.oval:def:9486", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9486" }, { "name": "sun-jre-javascript-unauthorized-access(41030)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41030" }, { "name": "29645", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29645" }, { "name": "GLSA-200804-28", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200804-28.xml" }, { "name": "29239", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29239" }, { "name": "29858", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29858" }, { "name": "TA08-066A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-066A.html" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "SUSE-SA:2008:025", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3178" }, { "name": "29582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29582" }, { "name": "ADV-2008-0770", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0770/references" }, { "name": "29526", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29526" }, { "name": "SUSE-SA:2008:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html" }, { "name": "31497", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31497" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-18.html" }, { "name": "RHSA-2008:0210", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0210.html" }, { "name": "TA08-087A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087A.html" }, { "name": "30780", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30780" }, { "name": "ADV-2008-1856", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1856/references" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html" }, { "name": "29547", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29547" }, { "name": "1019553", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019553" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128" }, { "name": "GLSA-200804-20", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml" }, { "name": "GLSA-200806-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml" }, { "name": "RHSA-2008:0186", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0186.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3179" }, { "name": "ADV-2008-0998", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0998/references" }, { "name": "29273", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29273" }, { "name": "MDVSA-2008:080", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:080" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Sun JDK and Java Runtime Environment (JRE) 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to access arbitrary network services on the local host via unspecified vectors related to JavaScript and Java APIs." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20080327 rPSA-2008-0128-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/490196/100/0/threaded" }, { "name": "29541", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29541" }, { "name": "APPLE-SA-2008-09-24", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html" }, { "name": "30676", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30676" }, { "name": "RHSA-2008:0267", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0267.html" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30620" }, { "name": "29560", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29560" }, { "name": "SUSE-SA:2008:018", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.html" }, { "name": "233326", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-233326-1" }, { "name": "32018", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32018" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "29897", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29897" }, { "name": "29498", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29498" }, { "name": "USN-592-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-592-1" }, { "name": "oval:org.mitre.oval:def:9486", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9486" }, { "name": "sun-jre-javascript-unauthorized-access(41030)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41030" }, { "name": "29645", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29645" }, { "name": "GLSA-200804-28", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200804-28.xml" }, { "name": "29239", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29239" }, { "name": "29858", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29858" }, { "name": "TA08-066A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-066A.html" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "SUSE-SA:2008:025", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3178" }, { "name": "29582", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29582" }, { "name": "ADV-2008-0770", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0770/references" }, { "name": "29526", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29526" }, { "name": "SUSE-SA:2008:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html" }, { "name": "31497", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31497" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-18.html" }, { "name": "RHSA-2008:0210", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0210.html" }, { "name": "TA08-087A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087A.html" }, { "name": "30780", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30780" }, { "name": "ADV-2008-1856", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1856/references" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html" }, { "name": "29547", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29547" }, { "name": "1019553", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019553" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128" }, { "name": "GLSA-200804-20", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml" }, { "name": "GLSA-200806-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml" }, { "name": "RHSA-2008:0186", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0186.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3179" }, { "name": "ADV-2008-0998", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0998/references" }, { "name": "29273", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29273" }, { "name": "MDVSA-2008:080", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:080" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1195", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Sun JDK and Java Runtime Environment (JRE) 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to access arbitrary network services on the local host via unspecified vectors related to JavaScript and Java APIs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20080327 rPSA-2008-0128-1 firefox", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/490196/100/0/threaded" }, { "name": "29541", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29541" }, { "name": "APPLE-SA-2008-09-24", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html" }, { "name": "30676", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30676" }, { "name": "RHSA-2008:0267", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0267.html" }, { "name": "30620", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30620" }, { "name": "29560", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29560" }, { "name": "SUSE-SA:2008:018", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.html" }, { "name": "233326", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-233326-1" }, { "name": "32018", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32018" }, { "name": "238492", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "29897", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29897" }, { "name": "29498", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29498" }, { "name": "USN-592-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-592-1" }, { "name": "oval:org.mitre.oval:def:9486", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9486" }, { "name": "sun-jre-javascript-unauthorized-access(41030)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41030" }, { "name": "29645", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29645" }, { "name": "GLSA-200804-28", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200804-28.xml" }, { "name": "29239", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29239" }, { "name": "29858", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29858" }, { "name": "TA08-066A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-066A.html" }, { "name": "ADV-2008-1793", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "SUSE-SA:2008:025", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.html" }, { "name": "http://support.apple.com/kb/HT3178", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3178" }, { "name": "29582", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29582" }, { "name": "ADV-2008-0770", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0770/references" }, { "name": "29526", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29526" }, { "name": "SUSE-SA:2008:019", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html" }, { "name": "31497", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31497" }, { "name": "http://www.mozilla.org/security/announce/2008/mfsa2008-18.html", "refsource": "CONFIRM", "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-18.html" }, { "name": "RHSA-2008:0210", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0210.html" }, { "name": "TA08-087A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-087A.html" }, { "name": "30780", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30780" }, { "name": "ADV-2008-1856", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1856/references" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html" }, { "name": "29547", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29547" }, { "name": "1019553", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019553" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128" }, { "name": "GLSA-200804-20", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml" }, { "name": "GLSA-200806-11", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml" }, { "name": "RHSA-2008:0186", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0186.html" }, { "name": "http://support.apple.com/kb/HT3179", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3179" }, { "name": "ADV-2008-0998", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0998/references" }, { "name": "29273", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29273" }, { "name": "MDVSA-2008:080", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:080" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1195", "datePublished": "2008-03-06T21:00:00", "dateReserved": "2008-03-06T00:00:00", "dateUpdated": "2024-08-07T08:08:57.886Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-4879 (GCVE-0-2007-4879)
Vulnerability from cvelistv5
Published
2007-09-13 18:00
Modified
2024-08-07 15:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Mozilla Firefox before Firefox 2.0.0.13, and SeaMonkey before 1.1.9, can automatically install TLS client certificates with minimal user interaction, and automatically sends these certificates when requested, which makes it easier for remote web sites to track user activities across domains by requesting the TLS client certificates from other domains.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:08:33.876Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20080327 rPSA-2008-0128-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/490196/100/0/threaded" }, { "name": "29541", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29541" }, { "name": "29539", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29539" }, { "name": "1019704", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019704" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30620" }, { "name": "29560", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29560" }, { "name": "DSA-1532", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1532" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "USN-592-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-592-1" }, { "name": "29616", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29616" }, { "name": "29645", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29645" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://0x90.eu/ff_tls_poc.html" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "29558", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29558" }, { "name": "29526", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29526" }, { "name": "SUSE-SA:2008:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html" }, { "name": "TA08-087A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-17.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=395399" }, { "name": "28448", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28448" }, { "name": "DSA-1534", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1534" }, { "name": "29547", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29547" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128" }, { "name": "ADV-2008-0998", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0998/references" }, { "name": "DSA-1535", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1535" }, { "name": "MDVSA-2008:080", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:080" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-09-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Mozilla Firefox before Firefox 2.0.0.13, and SeaMonkey before 1.1.9, can automatically install TLS client certificates with minimal user interaction, and automatically sends these certificates when requested, which makes it easier for remote web sites to track user activities across domains by requesting the TLS client certificates from other domains." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "20080327 rPSA-2008-0128-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/490196/100/0/threaded" }, { "name": "29541", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29541" }, { "name": "29539", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29539" }, { "name": "1019704", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019704" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30620" }, { "name": "29560", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29560" }, { "name": "DSA-1532", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1532" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "USN-592-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-592-1" }, { "name": "29616", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29616" }, { "name": "29645", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29645" }, { "tags": [ "x_refsource_MISC" ], "url": "http://0x90.eu/ff_tls_poc.html" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "29558", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29558" }, { "name": "29526", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29526" }, { "name": "SUSE-SA:2008:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html" }, { "name": "TA08-087A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-17.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=395399" }, { "name": "28448", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28448" }, { "name": "DSA-1534", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1534" }, { "name": "29547", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29547" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128" }, { "name": "ADV-2008-0998", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0998/references" }, { "name": "DSA-1535", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1535" }, { "name": "MDVSA-2008:080", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:080" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2007-4879", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mozilla Firefox before Firefox 2.0.0.13, and SeaMonkey before 1.1.9, can automatically install TLS client certificates with minimal user interaction, and automatically sends these certificates when requested, which makes it easier for remote web sites to track user activities across domains by requesting the TLS client certificates from other domains." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20080327 rPSA-2008-0128-1 firefox", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/490196/100/0/threaded" }, { "name": "29541", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29541" }, { "name": "29539", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29539" }, { "name": "1019704", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019704" }, { "name": "30620", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30620" }, { "name": "29560", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29560" }, { "name": "DSA-1532", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1532" }, { "name": "30327", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "USN-592-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-592-1" }, { "name": "29616", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29616" }, { "name": "29645", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29645" }, { "name": "http://0x90.eu/ff_tls_poc.html", "refsource": "MISC", "url": "http://0x90.eu/ff_tls_poc.html" }, { "name": "ADV-2008-1793", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "29558", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29558" }, { "name": "29526", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29526" }, { "name": "SUSE-SA:2008:019", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html" }, { "name": "TA08-087A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-087A.html" }, { "name": "http://www.mozilla.org/security/announce/2008/mfsa2008-17.html", "refsource": "CONFIRM", "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-17.html" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=395399", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=395399" }, { "name": "28448", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28448" }, { "name": "DSA-1534", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1534" }, { "name": "29547", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29547" }, { "name": "GLSA-200805-18", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128" }, { "name": "ADV-2008-0998", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0998/references" }, { "name": "DSA-1535", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1535" }, { "name": "MDVSA-2008:080", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:080" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2007-4879", "datePublished": "2007-09-13T18:00:00", "dateReserved": "2007-09-13T00:00:00", "dateUpdated": "2024-08-07T15:08:33.876Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-0593 (GCVE-0-2008-0593)
Vulnerability from cvelistv5
Published
2008-02-09 00:00
Modified
2024-08-07 07:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Gecko-based browsers, including Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8, modify the .href property of stylesheet DOM nodes to the final URI of a 302 redirect, which might allow remote attackers to bypass the Same Origin Policy and read sensitive information from the original URL, such as with Single-Signon systems.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:54:22.189Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2008:0104", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0104.html" }, { "name": "USN-576-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-576-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://browser.netscape.com/releasenotes/" }, { "name": "1019341", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019341" }, { "name": "28939", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28939" }, { "name": "DSA-1506", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1506" }, { "name": "FEDORA-2008-2118", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html" }, { "name": "FEDORA-2008-2060", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=397427" }, { "name": "28766", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28766" }, { "name": "28818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28818" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30620" }, { "name": "28865", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28865" }, { "name": "29049", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29049" }, { "name": "ADV-2008-0453", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0453/references" }, { "name": "RHSA-2008:0103", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0103.html" }, { "name": "28877", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28877" }, { "name": "28879", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28879" }, { "name": "29167", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29167" }, { "name": "29567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29567" }, { "name": "RHSA-2008:0105", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0105.html" }, { "name": "28958", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28958" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "DSA-1489", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1489" }, { "name": "20080209 rPSA-2008-0051-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487826/100/0/threaded" }, { "name": "29086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29086" }, { "name": "28815", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28815" }, { "name": "28864", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28864" }, { "name": "DSA-1485", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1485" }, { "name": "28924", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28924" }, { "name": "27683", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27683" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "oval:org.mitre.oval:def:10075", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10075" }, { "name": "SUSE-SA:2008:008", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html" }, { "name": "FEDORA-2008-1459", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html" }, { "name": "FEDORA-2008-1535", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0051" }, { "name": "DSA-1484", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1484" }, { "name": "ADV-2008-0627", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0627/references" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "name": "28754", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28754" }, { "name": "28758", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28758" }, { "name": "FEDORA-2008-1435", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html" }, { "name": "MDVSA-2008:048", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:048" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-10.html" }, { "name": "28839", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28839" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Gecko-based browsers, including Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8, modify the .href property of stylesheet DOM nodes to the final URI of a 302 redirect, which might allow remote attackers to bypass the Same Origin Policy and read sensitive information from the original URL, such as with Single-Signon systems." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2008:0104", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0104.html" }, { "name": "USN-576-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-576-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://browser.netscape.com/releasenotes/" }, { "name": "1019341", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019341" }, { "name": "28939", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28939" }, { "name": "DSA-1506", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1506" }, { "name": "FEDORA-2008-2118", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html" }, { "name": "FEDORA-2008-2060", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=397427" }, { "name": "28766", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28766" }, { "name": "28818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28818" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30620" }, { "name": "28865", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28865" }, { "name": "29049", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29049" }, { "name": "ADV-2008-0453", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0453/references" }, { "name": "RHSA-2008:0103", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0103.html" }, { "name": "28877", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28877" }, { "name": "28879", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28879" }, { "name": "29167", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29167" }, { "name": "29567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29567" }, { "name": "RHSA-2008:0105", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0105.html" }, { "name": "28958", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28958" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "DSA-1489", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1489" }, { "name": "20080209 rPSA-2008-0051-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487826/100/0/threaded" }, { "name": "29086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29086" }, { "name": "28815", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28815" }, { "name": "28864", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28864" }, { "name": "DSA-1485", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1485" }, { "name": "28924", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28924" }, { "name": "27683", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27683" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "oval:org.mitre.oval:def:10075", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10075" }, { "name": "SUSE-SA:2008:008", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html" }, { "name": "FEDORA-2008-1459", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html" }, { "name": "FEDORA-2008-1535", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0051" }, { "name": "DSA-1484", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1484" }, { "name": "ADV-2008-0627", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0627/references" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "name": "28754", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28754" }, { "name": "28758", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28758" }, { "name": "FEDORA-2008-1435", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html" }, { "name": "MDVSA-2008:048", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:048" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-10.html" }, { "name": "28839", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28839" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-0593", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Gecko-based browsers, including Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8, modify the .href property of stylesheet DOM nodes to the final URI of a 302 redirect, which might allow remote attackers to bypass the Same Origin Policy and read sensitive information from the original URL, such as with Single-Signon systems." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2008:0104", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0104.html" }, { "name": "USN-576-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-576-1" }, { "name": "http://browser.netscape.com/releasenotes/", "refsource": "CONFIRM", "url": "http://browser.netscape.com/releasenotes/" }, { "name": "1019341", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019341" }, { "name": "28939", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28939" }, { "name": "DSA-1506", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1506" }, { "name": "FEDORA-2008-2118", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html" }, { "name": "FEDORA-2008-2060", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=397427", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=397427" }, { "name": "28766", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28766" }, { "name": "28818", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28818" }, { "name": "30620", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30620" }, { "name": "28865", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28865" }, { "name": "29049", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29049" }, { "name": "ADV-2008-0453", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0453/references" }, { "name": "RHSA-2008:0103", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0103.html" }, { "name": "28877", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28877" }, { "name": "28879", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28879" }, { "name": "29167", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29167" }, { "name": "29567", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29567" }, { "name": "RHSA-2008:0105", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0105.html" }, { "name": "28958", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28958" }, { "name": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html", "refsource": "CONFIRM", "url": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html" }, { "name": "30327", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "DSA-1489", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1489" }, { "name": "20080209 rPSA-2008-0051-1 firefox", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487826/100/0/threaded" }, { "name": "29086", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29086" }, { "name": "28815", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28815" }, { "name": "28864", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28864" }, { "name": "DSA-1485", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1485" }, { "name": "28924", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28924" }, { "name": "27683", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27683" }, { "name": "ADV-2008-1793", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "oval:org.mitre.oval:def:10075", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10075" }, { "name": "SUSE-SA:2008:008", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html" }, { "name": "FEDORA-2008-1459", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html" }, { "name": "FEDORA-2008-1535", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2008-0051", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0051" }, { "name": "DSA-1484", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1484" }, { "name": "ADV-2008-0627", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0627/references" }, { "name": "GLSA-200805-18", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "name": "28754", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28754" }, { "name": "28758", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28758" }, { "name": "FEDORA-2008-1435", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html" }, { "name": "MDVSA-2008:048", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:048" }, { "name": "http://www.mozilla.org/security/announce/2008/mfsa2008-10.html", "refsource": "CONFIRM", "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-10.html" }, { "name": "28839", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28839" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-0593", "datePublished": "2008-02-09T00:00:00", "dateReserved": "2008-02-05T00:00:00", "dateUpdated": "2024-08-07T07:54:22.189Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-12362 (GCVE-0-2018-12362)
Vulnerability from cvelistv5
Published
2018-10-18 13:00
Modified
2024-08-05 08:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Integer overflow in SSSE3 scaler
Summary
An integer overflow can occur during graphics operations done by the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Mozilla | Thunderbird |
Version: unspecified < 60 Version: unspecified < 52.9 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.696Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201810-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "GLSA-201811-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201811-13" }, { "name": "DSA-4235", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4235" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1452375" }, { "name": "RHSA-2018:2113", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "DSA-4244", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4244" }, { "name": "104560", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104560" }, { "name": "1041193", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041193" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "USN-3714-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Thunderbird", "vendor": "Mozilla", "versions": [ { "lessThan": "60", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "52.9", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Firefox ESR", "vendor": "Mozilla", "versions": [ { "lessThan": "60.1", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "52.9", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Firefox", "vendor": "Mozilla", "versions": [ { "lessThan": "61", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-06-26T00:00:00", "descriptions": [ { "lang": "en", "value": "An integer overflow can occur during graphics operations done by the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer overflow in SSSE3 scaler", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-25T10:57:01", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "name": "GLSA-201810-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "GLSA-201811-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201811-13" }, { "name": "DSA-4235", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4235" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1452375" }, { "name": "RHSA-2018:2113", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "DSA-4244", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4244" }, { "name": "104560", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104560" }, { "name": "1041193", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041193" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "USN-3714-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2018-12362", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Thunderbird", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "60" }, { "version_affected": "\u003c", "version_value": "52.9" } ] } }, { "product_name": "Firefox ESR", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "60.1" }, { "version_affected": "\u003c", "version_value": "52.9" } ] } }, { "product_name": "Firefox", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "61" } ] } } ] }, "vendor_name": "Mozilla" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An integer overflow can occur during graphics operations done by the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer overflow in SSSE3 scaler" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201810-01", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-01" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-15/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "GLSA-201811-13", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201811-13" }, { "name": "DSA-4235", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4235" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-18/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1452375", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1452375" }, { "name": "RHSA-2018:2113", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-16/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "DSA-4244", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4244" }, { "name": "104560", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104560" }, { "name": "1041193", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041193" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-19/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-17/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "USN-3714-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2018-12362", "datePublished": "2018-10-18T13:00:00", "dateReserved": "2018-06-14T00:00:00", "dateUpdated": "2024-08-05T08:30:59.696Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-5188 (GCVE-0-2018-5188)
Vulnerability from cvelistv5
Published
2018-10-18 13:00
Modified
2024-08-05 05:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, Firefox ESR 52.9, and Thunderbird 60
Summary
Memory safety bugs present in Firefox 60, Firefox ESR 60, and Firefox ESR 52.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Mozilla | Thunderbird |
Version: unspecified < 60 Version: unspecified < 52.9 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:26:46.950Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201810-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-01" }, { "name": "104555", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104555" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "USN-3749-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3749-1/" }, { "name": "GLSA-201811-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201811-13" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "name": "RHSA-2018:2113", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456189%2C1456975%2C1465898%2C1392739%2C1451297%2C1464063%2C1437842%2C1442722%2C1452576%2C1450688%2C1458264%2C1458270%2C1465108%2C1464829%2C1464079%2C1463494%2C1458048" }, { "name": "DSA-4244", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4244" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "USN-3714-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Thunderbird", "vendor": "Mozilla", "versions": [ { "lessThan": "60", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "52.9", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Firefox ESR", "vendor": "Mozilla", "versions": [ { "lessThan": "60.1", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "52.9", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Firefox", "vendor": "Mozilla", "versions": [ { "lessThan": "61", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-06-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Memory safety bugs present in Firefox 60, Firefox ESR 60, and Firefox ESR 52.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, Firefox ESR 52.9, and Thunderbird 60", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-25T10:57:01", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "name": "GLSA-201810-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-01" }, { "name": "104555", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104555" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "USN-3749-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3749-1/" }, { "name": "GLSA-201811-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201811-13" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "name": "RHSA-2018:2113", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456189%2C1456975%2C1465898%2C1392739%2C1451297%2C1464063%2C1437842%2C1442722%2C1452576%2C1450688%2C1458264%2C1458270%2C1465108%2C1464829%2C1464079%2C1463494%2C1458048" }, { "name": "DSA-4244", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4244" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "USN-3714-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2018-5188", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Thunderbird", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "60" }, { "version_affected": "\u003c", "version_value": "52.9" } ] } }, { "product_name": "Firefox ESR", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "60.1" }, { "version_affected": "\u003c", "version_value": "52.9" } ] } }, { "product_name": "Firefox", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "61" } ] } } ] }, "vendor_name": "Mozilla" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory safety bugs present in Firefox 60, Firefox ESR 60, and Firefox ESR 52.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, Firefox ESR 52.9, and Thunderbird 60" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201810-01", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-01" }, { "name": "104555", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104555" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-15/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "USN-3749-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3749-1/" }, { "name": "GLSA-201811-13", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201811-13" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-18/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "name": "RHSA-2018:2113", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-16/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456189%2C1456975%2C1465898%2C1392739%2C1451297%2C1464063%2C1437842%2C1442722%2C1452576%2C1450688%2C1458264%2C1458270%2C1465108%2C1464829%2C1464079%2C1463494%2C1458048", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456189%2C1456975%2C1465898%2C1392739%2C1451297%2C1464063%2C1437842%2C1442722%2C1452576%2C1450688%2C1458264%2C1458270%2C1465108%2C1464829%2C1464079%2C1463494%2C1458048" }, { "name": "DSA-4244", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4244" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-19/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-17/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "USN-3714-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2018-5188", "datePublished": "2018-10-18T13:00:00", "dateReserved": "2018-01-03T00:00:00", "dateUpdated": "2024-08-05T05:26:46.950Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-12364 (GCVE-0-2018-12364)
Vulnerability from cvelistv5
Published
2018-10-18 13:00
Modified
2024-08-05 08:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CSRF attacks through 307 redirects and NPAPI plugins
Summary
NPAPI plugins, such as Adobe Flash, can send non-simple cross-origin requests, bypassing CORS by making a same-origin POST that does a 307 redirect to the target site. This allows for a malicious site to engage in cross-site request forgery (CSRF) attacks. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Mozilla | Thunderbird |
Version: unspecified < 60 Version: unspecified < 52.9 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:31:00.279Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201810-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "GLSA-201811-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201811-13" }, { "name": "DSA-4235", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4235" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "name": "RHSA-2018:2113", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "DSA-4244", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4244" }, { "name": "104560", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104560" }, { "name": "1041193", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041193" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1436241" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "USN-3714-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Thunderbird", "vendor": "Mozilla", "versions": [ { "lessThan": "60", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "52.9", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Firefox ESR", "vendor": "Mozilla", "versions": [ { "lessThan": "60.1", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "52.9", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Firefox", "vendor": "Mozilla", "versions": [ { "lessThan": "61", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-06-26T00:00:00", "descriptions": [ { "lang": "en", "value": "NPAPI plugins, such as Adobe Flash, can send non-simple cross-origin requests, bypassing CORS by making a same-origin POST that does a 307 redirect to the target site. This allows for a malicious site to engage in cross-site request forgery (CSRF) attacks. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61." } ], "problemTypes": [ { "descriptions": [ { "description": "CSRF attacks through 307 redirects and NPAPI plugins", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-25T10:57:01", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "name": "GLSA-201810-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "GLSA-201811-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201811-13" }, { "name": "DSA-4235", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4235" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "name": "RHSA-2018:2113", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "DSA-4244", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4244" }, { "name": "104560", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104560" }, { "name": "1041193", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041193" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1436241" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "USN-3714-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2018-12364", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Thunderbird", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "60" }, { "version_affected": "\u003c", "version_value": "52.9" } ] } }, { "product_name": "Firefox ESR", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "60.1" }, { "version_affected": "\u003c", "version_value": "52.9" } ] } }, { "product_name": "Firefox", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "61" } ] } } ] }, "vendor_name": "Mozilla" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NPAPI plugins, such as Adobe Flash, can send non-simple cross-origin requests, bypassing CORS by making a same-origin POST that does a 307 redirect to the target site. This allows for a malicious site to engage in cross-site request forgery (CSRF) attacks. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CSRF attacks through 307 redirects and NPAPI plugins" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201810-01", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-01" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-15/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "GLSA-201811-13", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201811-13" }, { "name": "DSA-4235", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4235" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-18/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "name": "RHSA-2018:2113", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-16/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "DSA-4244", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4244" }, { "name": "104560", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104560" }, { "name": "1041193", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041193" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-19/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1436241", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1436241" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-17/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "USN-3714-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2018-12364", "datePublished": "2018-10-18T13:00:00", "dateReserved": "2018-06-14T00:00:00", "dateUpdated": "2024-08-05T08:31:00.279Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-0414 (GCVE-0-2008-0414)
Vulnerability from cvelistv5
Published
2008-02-08 21:00
Modified
2024-08-07 07:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to trick the user into uploading arbitrary files via label tags that shift focus to a file input field, aka "focus spoofing."
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:46:54.483Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-576-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-576-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://browser.netscape.com/releasenotes/" }, { "name": "28939", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28939" }, { "name": "DSA-1506", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1506" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30620" }, { "name": "28865", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28865" }, { "name": "29049", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29049" }, { "name": "ADV-2008-0453", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0453/references" }, { "name": "28877", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28877" }, { "name": "28879", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28879" }, { "name": "29567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29567" }, { "name": "28958", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28958" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "DSA-1489", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1489" }, { "name": "20080212 FLEA-2008-0001-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/488002/100/0/threaded" }, { "name": "20080209 rPSA-2008-0051-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487826/100/0/threaded" }, { "name": "29086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29086" }, { "name": "28815", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28815" }, { "name": "28864", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28864" }, { "name": "DSA-1485", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1485" }, { "name": "28924", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28924" }, { "name": "27683", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27683" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-02.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=404451%2C408034%2C404391%2C405299" }, { "name": "1019330", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019330" }, { "name": "SUSE-SA:2008:008", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html" }, { "name": "FEDORA-2008-1459", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html" }, { "name": "FEDORA-2008-1535", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0051" }, { "name": "DSA-1484", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1484" }, { "name": "ADV-2008-0627", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0627/references" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "name": "28758", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28758" }, { "name": "FEDORA-2008-1435", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html" }, { "name": "MDVSA-2008:048", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:048" }, { "name": "28839", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28839" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to trick the user into uploading arbitrary files via label tags that shift focus to a file input field, aka \"focus spoofing.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "USN-576-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-576-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://browser.netscape.com/releasenotes/" }, { "name": "28939", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28939" }, { "name": "DSA-1506", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1506" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30620" }, { "name": "28865", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28865" }, { "name": "29049", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29049" }, { "name": "ADV-2008-0453", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0453/references" }, { "name": "28877", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28877" }, { "name": "28879", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28879" }, { "name": "29567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29567" }, { "name": "28958", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28958" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "DSA-1489", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1489" }, { "name": "20080212 FLEA-2008-0001-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/488002/100/0/threaded" }, { "name": "20080209 rPSA-2008-0051-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487826/100/0/threaded" }, { "name": "29086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29086" }, { "name": "28815", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28815" }, { "name": "28864", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28864" }, { "name": "DSA-1485", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1485" }, { "name": "28924", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28924" }, { "name": "27683", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27683" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-02.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=404451%2C408034%2C404391%2C405299" }, { "name": "1019330", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019330" }, { "name": "SUSE-SA:2008:008", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html" }, { "name": "FEDORA-2008-1459", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html" }, { "name": "FEDORA-2008-1535", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0051" }, { "name": "DSA-1484", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1484" }, { "name": "ADV-2008-0627", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0627/references" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "name": "28758", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28758" }, { "name": "FEDORA-2008-1435", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html" }, { "name": "MDVSA-2008:048", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:048" }, { "name": "28839", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28839" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-0414", "datePublished": "2008-02-08T21:00:00", "dateReserved": "2008-01-23T00:00:00", "dateUpdated": "2024-08-07T07:46:54.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-0415 (GCVE-0-2008-0415)
Vulnerability from cvelistv5
Published
2008-02-08 21:00
Modified
2024-08-07 07:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to execute script outside of the sandbox and conduct cross-site scripting (XSS) attacks via multiple vectors including the XMLDocument.load function, aka "JavaScript privilege escalation bugs."
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:46:54.332Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2008:0104", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0104.html" }, { "name": "USN-582-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-582-2" }, { "name": "USN-576-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-576-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://browser.netscape.com/releasenotes/" }, { "name": "28939", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28939" }, { "name": "DSA-1506", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1506" }, { "name": "SSA:2008-061-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.445399" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1995" }, { "name": "FEDORA-2008-2118", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html" }, { "name": "FEDORA-2008-2060", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093" }, { "name": "28766", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28766" }, { "name": "28818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28818" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30620" }, { "name": "28865", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28865" }, { "name": "29049", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29049" }, { "name": "ADV-2008-0453", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0453/references" }, { "name": "RHSA-2008:0103", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0103.html" }, { "name": "28877", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28877" }, { "name": "28879", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28879" }, { "name": "USN-582-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-582-1" }, { "name": "29167", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29167" }, { "name": "29567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29567" }, { "name": "RHSA-2008:0105", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0105.html" }, { "name": "28958", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28958" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "20080229 rPSA-2008-0093-1 thunderbird", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/488971/100/0/threaded" }, { "name": "DSA-1489", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1489" }, { "name": "20080212 FLEA-2008-0001-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/488002/100/0/threaded" }, { "name": "20080209 rPSA-2008-0051-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487826/100/0/threaded" }, { "name": "29086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29086" }, { "name": "28815", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28815" }, { "name": "ADV-2008-0454", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0454/references" }, { "name": "239546", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1" }, { "name": "28864", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28864" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=386695%2C393761%2C393762%2C399298%2C407289%2C372075%2C363597" }, { "name": "oval:org.mitre.oval:def:9897", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9897" }, { "name": "DSA-1485", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1485" }, { "name": "28924", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28924" }, { "name": "27683", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27683" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-03.html" }, { "name": "1019327", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019327" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0093" }, { "name": "ADV-2008-2091", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2091/references" }, { "name": "SUSE-SA:2008:008", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html" }, { "name": "FEDORA-2008-1459", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html" }, { "name": "29164", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29164" }, { "name": "29211", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29211" }, { "name": "FEDORA-2008-1535", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0051" }, { "name": "MDVSA-2008:062", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:062" }, { "name": "DSA-1484", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1484" }, { "name": "28808", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28808" }, { "name": "ADV-2008-0627", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0627/references" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "name": "28754", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28754" }, { "name": "28758", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28758" }, { "name": "FEDORA-2008-1435", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html" }, { "name": "MDVSA-2008:048", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:048" }, { "name": "31043", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31043" }, { "name": "29098", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29098" }, { "name": "28839", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28839" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to execute script outside of the sandbox and conduct cross-site scripting (XSS) attacks via multiple vectors including the XMLDocument.load function, aka \"JavaScript privilege escalation bugs.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2008:0104", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0104.html" }, { "name": "USN-582-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-582-2" }, { "name": "USN-576-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-576-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://browser.netscape.com/releasenotes/" }, { "name": "28939", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28939" }, { "name": "DSA-1506", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1506" }, { "name": "SSA:2008-061-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.445399" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1995" }, { "name": "FEDORA-2008-2118", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html" }, { "name": "FEDORA-2008-2060", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093" }, { "name": "28766", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28766" }, { "name": "28818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28818" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30620" }, { "name": "28865", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28865" }, { "name": "29049", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29049" }, { "name": "ADV-2008-0453", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0453/references" }, { "name": "RHSA-2008:0103", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0103.html" }, { "name": "28877", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28877" }, { "name": "28879", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28879" }, { "name": "USN-582-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-582-1" }, { "name": "29167", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29167" }, { "name": "29567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29567" }, { "name": "RHSA-2008:0105", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0105.html" }, { "name": "28958", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28958" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "20080229 rPSA-2008-0093-1 thunderbird", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/488971/100/0/threaded" }, { "name": "DSA-1489", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1489" }, { "name": "20080212 FLEA-2008-0001-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/488002/100/0/threaded" }, { "name": "20080209 rPSA-2008-0051-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487826/100/0/threaded" }, { "name": "29086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29086" }, { "name": "28815", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28815" }, { "name": "ADV-2008-0454", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0454/references" }, { "name": "239546", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1" }, { "name": "28864", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28864" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=386695%2C393761%2C393762%2C399298%2C407289%2C372075%2C363597" }, { "name": "oval:org.mitre.oval:def:9897", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9897" }, { "name": "DSA-1485", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1485" }, { "name": "28924", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28924" }, { "name": "27683", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27683" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-03.html" }, { "name": "1019327", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019327" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0093" }, { "name": "ADV-2008-2091", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2091/references" }, { "name": "SUSE-SA:2008:008", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html" }, { "name": "FEDORA-2008-1459", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html" }, { "name": "29164", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29164" }, { "name": "29211", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29211" }, { "name": "FEDORA-2008-1535", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0051" }, { "name": "MDVSA-2008:062", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:062" }, { "name": "DSA-1484", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1484" }, { "name": "28808", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28808" }, { "name": "ADV-2008-0627", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0627/references" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "name": "28754", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28754" }, { "name": "28758", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28758" }, { "name": "FEDORA-2008-1435", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html" }, { "name": "MDVSA-2008:048", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:048" }, { "name": "31043", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31043" }, { "name": "29098", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29098" }, { "name": "28839", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28839" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-0415", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to execute script outside of the sandbox and conduct cross-site scripting (XSS) attacks via multiple vectors including the XMLDocument.load function, aka \"JavaScript privilege escalation bugs.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2008:0104", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0104.html" }, { "name": "USN-582-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-582-2" }, { "name": "USN-576-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-576-1" }, { "name": "http://browser.netscape.com/releasenotes/", "refsource": "CONFIRM", "url": "http://browser.netscape.com/releasenotes/" }, { "name": "28939", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28939" }, { "name": "DSA-1506", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1506" }, { "name": "SSA:2008-061-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.445399" }, { "name": "https://issues.rpath.com/browse/RPL-1995", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1995" }, { "name": "FEDORA-2008-2118", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html" }, { "name": "FEDORA-2008-2060", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093" }, { "name": "28766", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28766" }, { "name": "28818", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28818" }, { "name": "30620", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30620" }, { "name": "28865", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28865" }, { "name": "29049", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29049" }, { "name": "ADV-2008-0453", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0453/references" }, { "name": "RHSA-2008:0103", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0103.html" }, { "name": "28877", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28877" }, { "name": "28879", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28879" }, { "name": "USN-582-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-582-1" }, { "name": "29167", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29167" }, { "name": "29567", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29567" }, { "name": "RHSA-2008:0105", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0105.html" }, { "name": "28958", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28958" }, { "name": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html", "refsource": "CONFIRM", "url": "http://support.novell.com/techcenter/psdb/6251b18e050302ebe7fe74294b55c818.html" }, { "name": "30327", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "20080229 rPSA-2008-0093-1 thunderbird", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/488971/100/0/threaded" }, { "name": "DSA-1489", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1489" }, { "name": "20080212 FLEA-2008-0001-1 firefox", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/488002/100/0/threaded" }, { "name": "20080209 rPSA-2008-0051-1 firefox", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487826/100/0/threaded" }, { "name": "29086", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29086" }, { "name": "28815", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28815" }, { "name": "ADV-2008-0454", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0454/references" }, { "name": "239546", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1" }, { "name": "28864", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28864" }, { "name": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=386695,393761,393762,399298,407289,372075,363597", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=386695,393761,393762,399298,407289,372075,363597" }, { "name": "oval:org.mitre.oval:def:9897", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9897" }, { "name": "DSA-1485", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1485" }, { "name": "28924", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28924" }, { "name": "27683", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27683" }, { "name": "ADV-2008-1793", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "http://www.mozilla.org/security/announce/2008/mfsa2008-03.html", "refsource": "CONFIRM", "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-03.html" }, { "name": "1019327", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019327" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2008-0093", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0093" }, { "name": "ADV-2008-2091", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2091/references" }, { "name": "SUSE-SA:2008:008", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00006.html" }, { "name": "FEDORA-2008-1459", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00309.html" }, { "name": "29164", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29164" }, { "name": "29211", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29211" }, { "name": "FEDORA-2008-1535", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00381.html" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2008-0051", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0051" }, { "name": "MDVSA-2008:062", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:062" }, { "name": "DSA-1484", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1484" }, { "name": "28808", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28808" }, { "name": "ADV-2008-0627", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0627/references" }, { "name": "GLSA-200805-18", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "name": "28754", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28754" }, { "name": "28758", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28758" }, { "name": "FEDORA-2008-1435", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00274.html" }, { "name": "MDVSA-2008:048", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:048" }, { "name": "31043", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31043" }, { "name": "29098", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29098" }, { "name": "28839", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28839" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-0415", "datePublished": "2008-02-08T21:00:00", "dateReserved": "2008-01-23T00:00:00", "dateUpdated": "2024-08-07T07:46:54.332Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-12359 (GCVE-0-2018-12359)
Vulnerability from cvelistv5
Published
2018-10-18 13:00
Modified
2024-08-05 08:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Buffer overflow using computed size of canvas element
Summary
A buffer overflow can occur when rendering canvas content while adjusting the height and width of the canvas element dynamically, causing data to be written outside of the currently computed boundaries. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Mozilla | Thunderbird |
Version: unspecified < 60 Version: unspecified < 52.9 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.942Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1459162" }, { "name": "GLSA-201810-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-01" }, { "name": "104555", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104555" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "GLSA-201811-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201811-13" }, { "name": "DSA-4235", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4235" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "name": "RHSA-2018:2113", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "DSA-4244", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4244" }, { "name": "1041193", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041193" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "USN-3714-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Thunderbird", "vendor": "Mozilla", "versions": [ { "lessThan": "60", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "52.9", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Firefox ESR", "vendor": "Mozilla", "versions": [ { "lessThan": "60.1", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "52.9", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Firefox", "vendor": "Mozilla", "versions": [ { "lessThan": "61", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-06-26T00:00:00", "descriptions": [ { "lang": "en", "value": "A buffer overflow can occur when rendering canvas content while adjusting the height and width of the canvas element dynamically, causing data to be written outside of the currently computed boundaries. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow using computed size of canvas element", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-25T10:57:01", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1459162" }, { "name": "GLSA-201810-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-01" }, { "name": "104555", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104555" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "GLSA-201811-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201811-13" }, { "name": "DSA-4235", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4235" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "name": "RHSA-2018:2113", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "DSA-4244", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4244" }, { "name": "1041193", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041193" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "USN-3714-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2018-12359", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Thunderbird", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "60" }, { "version_affected": "\u003c", "version_value": "52.9" } ] } }, { "product_name": "Firefox ESR", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "60.1" }, { "version_affected": "\u003c", "version_value": "52.9" } ] } }, { "product_name": "Firefox", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "61" } ] } } ] }, "vendor_name": "Mozilla" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A buffer overflow can occur when rendering canvas content while adjusting the height and width of the canvas element dynamically, causing data to be written outside of the currently computed boundaries. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow using computed size of canvas element" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1459162", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1459162" }, { "name": "GLSA-201810-01", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-01" }, { "name": "104555", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104555" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-15/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "GLSA-201811-13", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201811-13" }, { "name": "DSA-4235", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4235" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-18/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "name": "RHSA-2018:2113", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-16/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "DSA-4244", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4244" }, { "name": "1041193", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041193" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-19/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-17/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "USN-3714-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2018-12359", "datePublished": "2018-10-18T13:00:00", "dateReserved": "2018-06-14T00:00:00", "dateUpdated": "2024-08-05T08:30:59.942Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-12360 (GCVE-0-2018-12360)
Vulnerability from cvelistv5
Published
2018-10-18 13:00
Modified
2024-08-05 08:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Use-after-free when using focus()
Summary
A use-after-free vulnerability can occur when deleting an input element during a mutation event handler triggered by focusing that element. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Mozilla | Thunderbird |
Version: unspecified < 60 Version: unspecified < 52.9 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.673Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201810-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-01" }, { "name": "104555", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104555" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "GLSA-201811-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201811-13" }, { "name": "DSA-4235", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4235" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "name": "RHSA-2018:2113", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "DSA-4244", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4244" }, { "name": "1041193", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041193" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1459693" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "USN-3714-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Thunderbird", "vendor": "Mozilla", "versions": [ { "lessThan": "60", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "52.9", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Firefox ESR", "vendor": "Mozilla", "versions": [ { "lessThan": "60.1", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "52.9", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Firefox", "vendor": "Mozilla", "versions": [ { "lessThan": "61", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-06-26T00:00:00", "descriptions": [ { "lang": "en", "value": "A use-after-free vulnerability can occur when deleting an input element during a mutation event handler triggered by focusing that element. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61." } ], "problemTypes": [ { "descriptions": [ { "description": "Use-after-free when using focus()", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-25T10:57:01", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "name": "GLSA-201810-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-01" }, { "name": "104555", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104555" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "GLSA-201811-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201811-13" }, { "name": "DSA-4235", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4235" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "name": "RHSA-2018:2113", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "DSA-4244", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4244" }, { "name": "1041193", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041193" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1459693" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "USN-3714-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2018-12360", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Thunderbird", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "60" }, { "version_affected": "\u003c", "version_value": "52.9" } ] } }, { "product_name": "Firefox ESR", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "60.1" }, { "version_affected": "\u003c", "version_value": "52.9" } ] } }, { "product_name": "Firefox", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "61" } ] } } ] }, "vendor_name": "Mozilla" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A use-after-free vulnerability can occur when deleting an input element during a mutation event handler triggered by focusing that element. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use-after-free when using focus()" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201810-01", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-01" }, { "name": "104555", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104555" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-15/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "GLSA-201811-13", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201811-13" }, { "name": "DSA-4235", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4235" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-18/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "name": "RHSA-2018:2113", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-16/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "DSA-4244", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4244" }, { "name": "1041193", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041193" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-19/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1459693", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1459693" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-17/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "USN-3714-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2018-12360", "datePublished": "2018-10-18T13:00:00", "dateReserved": "2018-06-14T00:00:00", "dateUpdated": "2024-08-05T08:30:59.673Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-1236 (GCVE-0-2008-1236)
Vulnerability from cvelistv5
Published
2008-03-27 10:00
Modified
2024-08-07 08:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the layout engine.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:17:33.811Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20080327 rPSA-2008-0128-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/490196/100/0/threaded" }, { "name": "1019695", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019695" }, { "name": "29541", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29541" }, { "name": "29539", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29539" }, { "name": "ADV-2008-0999", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0999/references" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-15.html" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30620" }, { "name": "29560", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29560" }, { "name": "DSA-1532", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1532" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "USN-592-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-592-1" }, { "name": "29616", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29616" }, { "name": "29550", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29550" }, { "name": "29645", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29645" }, { "name": "USN-605-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-605-1" }, { "name": "29607", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29607" }, { "name": "239546", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1" }, { "name": "MDVSA-2008:155", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:155" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "DSA-1574", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1574" }, { "name": "29558", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29558" }, { "name": "29548", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29548" }, { "name": "30370", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30370" }, { "name": "RHSA-2008:0208", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0208.html" }, { "name": "29526", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29526" }, { "name": "ADV-2008-2091", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2091/references" }, { "name": "SUSE-SA:2008:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html" }, { "name": "TA08-087A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087A.html" }, { "name": "29391", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29391" }, { "name": "30192", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30192" }, { "name": "SSA:2008-128-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.447313" }, { "name": "RHSA-2008:0209", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0209.html" }, { "name": "28448", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28448" }, { "name": "RHSA-2008:0207", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0207.html" }, { "name": "30016", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30016" }, { "name": "DSA-1534", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1534" }, { "name": "FEDORA-2008-3519", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html" }, { "name": "29547", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29547" }, { "name": "oval:org.mitre.oval:def:11788", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11788" }, { "name": "30105", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30105" }, { "name": "30094", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30094" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128" }, { "name": "mozilla-layoutengine-code-execution(41445)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41445" }, { "name": "31043", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31043" }, { "name": "FEDORA-2008-3557", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html" }, { "name": "ADV-2008-0998", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0998/references" }, { "name": "DSA-1535", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1535" }, { "name": "MDVSA-2008:080", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:080" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the layout engine." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "20080327 rPSA-2008-0128-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/490196/100/0/threaded" }, { "name": "1019695", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019695" }, { "name": "29541", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29541" }, { "name": "29539", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29539" }, { "name": "ADV-2008-0999", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0999/references" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-15.html" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30620" }, { "name": "29560", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29560" }, { "name": "DSA-1532", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1532" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "USN-592-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-592-1" }, { "name": "29616", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29616" }, { "name": "29550", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29550" }, { "name": "29645", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29645" }, { "name": "USN-605-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-605-1" }, { "name": "29607", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29607" }, { "name": "239546", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1" }, { "name": "MDVSA-2008:155", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:155" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "DSA-1574", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1574" }, { "name": "29558", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29558" }, { "name": "29548", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29548" }, { "name": "30370", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30370" }, { "name": "RHSA-2008:0208", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0208.html" }, { "name": "29526", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29526" }, { "name": "ADV-2008-2091", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2091/references" }, { "name": "SUSE-SA:2008:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html" }, { "name": "TA08-087A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087A.html" }, { "name": "29391", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29391" }, { "name": "30192", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30192" }, { "name": "SSA:2008-128-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.447313" }, { "name": "RHSA-2008:0209", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0209.html" }, { "name": "28448", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28448" }, { "name": "RHSA-2008:0207", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0207.html" }, { "name": "30016", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30016" }, { "name": "DSA-1534", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1534" }, { "name": "FEDORA-2008-3519", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html" }, { "name": "29547", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29547" }, { "name": "oval:org.mitre.oval:def:11788", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11788" }, { "name": "30105", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30105" }, { "name": "30094", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30094" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128" }, { "name": "mozilla-layoutengine-code-execution(41445)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41445" }, { "name": "31043", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31043" }, { "name": "FEDORA-2008-3557", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html" }, { "name": "ADV-2008-0998", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0998/references" }, { "name": "DSA-1535", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1535" }, { "name": "MDVSA-2008:080", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:080" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-1236", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the layout engine." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20080327 rPSA-2008-0128-1 firefox", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/490196/100/0/threaded" }, { "name": "1019695", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019695" }, { "name": "29541", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29541" }, { "name": "29539", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29539" }, { "name": "ADV-2008-0999", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0999/references" }, { "name": "http://www.mozilla.org/security/announce/2008/mfsa2008-15.html", "refsource": "CONFIRM", "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-15.html" }, { "name": "30620", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30620" }, { "name": "29560", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29560" }, { "name": "DSA-1532", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1532" }, { "name": "30327", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "USN-592-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-592-1" }, { "name": "29616", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29616" }, { "name": "29550", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29550" }, { "name": "29645", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29645" }, { "name": "USN-605-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-605-1" }, { "name": "29607", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29607" }, { "name": "239546", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1" }, { "name": "MDVSA-2008:155", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:155" }, { "name": "ADV-2008-1793", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "DSA-1574", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1574" }, { "name": "29558", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29558" }, { "name": "29548", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29548" }, { "name": "30370", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30370" }, { "name": "RHSA-2008:0208", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2008-0208.html" }, { "name": "29526", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29526" }, { "name": "ADV-2008-2091", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2091/references" }, { "name": "SUSE-SA:2008:019", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html" }, { "name": "TA08-087A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-087A.html" }, { "name": "29391", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29391" }, { "name": "30192", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30192" }, { "name": "SSA:2008-128-02", "refsource": "SLACKWARE", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.447313" }, { "name": "RHSA-2008:0209", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0209.html" }, { "name": "28448", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28448" }, { "name": "RHSA-2008:0207", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0207.html" }, { "name": "30016", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30016" }, { "name": "DSA-1534", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1534" }, { "name": "FEDORA-2008-3519", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html" }, { "name": "29547", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29547" }, { "name": "oval:org.mitre.oval:def:11788", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11788" }, { "name": "30105", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30105" }, { "name": "30094", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30094" }, { "name": "GLSA-200805-18", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128" }, { "name": "mozilla-layoutengine-code-execution(41445)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41445" }, { "name": "31043", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31043" }, { "name": "FEDORA-2008-3557", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html" }, { "name": "ADV-2008-0998", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0998/references" }, { "name": "DSA-1535", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1535" }, { "name": "MDVSA-2008:080", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:080" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-1236", "datePublished": "2008-03-27T10:00:00", "dateReserved": "2008-03-10T00:00:00", "dateUpdated": "2024-08-07T08:17:33.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-5156 (GCVE-0-2018-5156)
Vulnerability from cvelistv5
Published
2018-10-18 13:00
Modified
2024-08-05 05:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Media recorder segmentation fault when track type is changed during capture
Summary
A vulnerability can occur when capturing a media stream when the media source type is changed as the capture is occurring. This can result in stream data being cast to the wrong type causing a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Mozilla | Thunderbird |
Version: unspecified < 60 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:26:46.986Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201810-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "[debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html" }, { "name": "GLSA-201811-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201811-13" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1453127" }, { "name": "DSA-4235", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4235" }, { "name": "DSA-4295", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4295" }, { "name": "RHSA-2018:2113", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "104560", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104560" }, { "name": "1041193", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041193" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "USN-3705-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Thunderbird", "vendor": "Mozilla", "versions": [ { "lessThan": "60", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Firefox ESR", "vendor": "Mozilla", "versions": [ { "lessThan": "60.1", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "52.9", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Firefox", "vendor": "Mozilla", "versions": [ { "lessThan": "61", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-06-26T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability can occur when capturing a media stream when the media source type is changed as the capture is occurring. This can result in stream data being cast to the wrong type causing a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61." } ], "problemTypes": [ { "descriptions": [ { "description": "Media recorder segmentation fault when track type is changed during capture", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-25T10:57:01", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "name": "GLSA-201810-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "[debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html" }, { "name": "GLSA-201811-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201811-13" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1453127" }, { "name": "DSA-4235", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4235" }, { "name": "DSA-4295", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4295" }, { "name": "RHSA-2018:2113", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "104560", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104560" }, { "name": "1041193", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041193" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "USN-3705-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2018-5156", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Thunderbird", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "60" } ] } }, { "product_name": "Firefox ESR", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "60.1" }, { "version_affected": "\u003c", "version_value": "52.9" } ] } }, { "product_name": "Firefox", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "61" } ] } } ] }, "vendor_name": "Mozilla" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability can occur when capturing a media stream when the media source type is changed as the capture is occurring. This can result in stream data being cast to the wrong type causing a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Media recorder segmentation fault when track type is changed during capture" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201810-01", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-01" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-15/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "[debian-lts-announce] 20181112 [SECURITY] [DLA 1575-1] thunderbird security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html" }, { "name": "GLSA-201811-13", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201811-13" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1453127", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1453127" }, { "name": "DSA-4235", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4235" }, { "name": "DSA-4295", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4295" }, { "name": "RHSA-2018:2113", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-16/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "104560", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104560" }, { "name": "1041193", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041193" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-19/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-17/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "USN-3705-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2018-5156", "datePublished": "2018-10-18T13:00:00", "dateReserved": "2018-01-03T00:00:00", "dateUpdated": "2024-08-05T05:26:46.986Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-1241 (GCVE-0-2008-1241)
Vulnerability from cvelistv5
Published
2008-03-27 10:00
Modified
2024-08-07 08:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
GUI overlay vulnerability in Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9 allows remote attackers to spoof form elements and redirect user inputs via a borderless XUL pop-up window from a background tab.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:17:33.627Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20080327 rPSA-2008-0128-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/490196/100/0/threaded" }, { "name": "29541", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29541" }, { "name": "29539", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29539" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-19.html" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30620" }, { "name": "29560", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29560" }, { "name": "DSA-1532", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1532" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "USN-592-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-592-1" }, { "name": "29616", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29616" }, { "name": "29550", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29550" }, { "name": "29645", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29645" }, { "name": "29607", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29607" }, { "name": "oval:org.mitre.oval:def:11163", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11163" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "29558", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29558" }, { "name": "RHSA-2008:0208", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0208.html" }, { "name": "29526", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29526" }, { "name": "SUSE-SA:2008:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html" }, { "name": "TA08-087A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087A.html" }, { "name": "29391", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29391" }, { "name": "1019700", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019700" }, { "name": "RHSA-2008:0209", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0209.html" }, { "name": "28448", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28448" }, { "name": "RHSA-2008:0207", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0207.html" }, { "name": "DSA-1534", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1534" }, { "name": "29547", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29547" }, { "name": "firefox-xul-popup-spoofing(41454)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41454" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128" }, { "name": "ADV-2008-0998", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0998/references" }, { "name": "DSA-1535", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1535" }, { "name": "MDVSA-2008:080", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:080" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-25T00:00:00", "descriptions": [ { "lang": "en", "value": "GUI overlay vulnerability in Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9 allows remote attackers to spoof form elements and redirect user inputs via a borderless XUL pop-up window from a background tab." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "20080327 rPSA-2008-0128-1 firefox", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/490196/100/0/threaded" }, { "name": "29541", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29541" }, { "name": "29539", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29539" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2008/mfsa2008-19.html" }, { "name": "30620", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30620" }, { "name": "29560", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29560" }, { "name": "DSA-1532", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1532" }, { "name": "30327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30327" }, { "name": "238492", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1" }, { "name": "USN-592-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-592-1" }, { "name": "29616", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29616" }, { "name": "29550", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29550" }, { "name": "29645", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29645" }, { "name": "29607", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29607" }, { "name": "oval:org.mitre.oval:def:11163", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11163" }, { "name": "ADV-2008-1793", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1793/references" }, { "name": "29558", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29558" }, { "name": "RHSA-2008:0208", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0208.html" }, { "name": "29526", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29526" }, { "name": "SUSE-SA:2008:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html" }, { "name": "TA08-087A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-087A.html" }, { "name": "29391", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29391" }, { "name": "1019700", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019700" }, { "name": "RHSA-2008:0209", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0209.html" }, { "name": "28448", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28448" }, { "name": "RHSA-2008:0207", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0207.html" }, { "name": "DSA-1534", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1534" }, { "name": "29547", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29547" }, { "name": "firefox-xul-popup-spoofing(41454)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41454" }, { "name": "GLSA-200805-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128" }, { "name": "ADV-2008-0998", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0998/references" }, { "name": "DSA-1535", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1535" }, { "name": "MDVSA-2008:080", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:080" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-1241", "datePublished": "2008-03-27T10:00:00", "dateReserved": "2008-03-10T00:00:00", "dateUpdated": "2024-08-07T08:17:33.627Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-12366 (GCVE-0-2018-12366)
Vulnerability from cvelistv5
Published
2018-10-18 13:00
Modified
2024-08-05 08:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Invalid data handling during QCMS transformations
Summary
An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds read interpreted as a float value. This could leak private data into the output. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Mozilla | Thunderbird |
Version: unspecified < 60 Version: unspecified < 52.9 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.988Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201810-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "GLSA-201811-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201811-13" }, { "name": "DSA-4235", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4235" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "name": "RHSA-2018:2113", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "DSA-4244", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4244" }, { "name": "104560", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104560" }, { "name": "1041193", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041193" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1464039" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "USN-3714-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Thunderbird", "vendor": "Mozilla", "versions": [ { "lessThan": "60", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "52.9", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Firefox ESR", "vendor": "Mozilla", "versions": [ { "lessThan": "60.1", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "52.9", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Firefox", "vendor": "Mozilla", "versions": [ { "lessThan": "61", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-06-26T00:00:00", "descriptions": [ { "lang": "en", "value": "An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds read interpreted as a float value. This could leak private data into the output. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61." } ], "problemTypes": [ { "descriptions": [ { "description": "Invalid data handling during QCMS transformations", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-25T10:57:01", "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "shortName": "mozilla" }, "references": [ { "name": "GLSA-201810-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "GLSA-201811-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201811-13" }, { "name": "DSA-4235", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4235" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "name": "RHSA-2018:2113", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "DSA-4244", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4244" }, { "name": "104560", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104560" }, { "name": "1041193", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041193" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1464039" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "USN-3714-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2018-12366", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Thunderbird", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "60" }, { "version_affected": "\u003c", "version_value": "52.9" } ] } }, { "product_name": "Firefox ESR", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "60.1" }, { "version_affected": "\u003c", "version_value": "52.9" } ] } }, { "product_name": "Firefox", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "61" } ] } } ] }, "vendor_name": "Mozilla" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds read interpreted as a float value. This could leak private data into the output. This vulnerability affects Thunderbird \u003c 60, Thunderbird \u003c 52.9, Firefox ESR \u003c 60.1, Firefox ESR \u003c 52.9, and Firefox \u003c 61." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Invalid data handling during QCMS transformations" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201810-01", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-01" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-15/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-15/" }, { "name": "RHSA-2018:2112", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2112" }, { "name": "GLSA-201811-13", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201811-13" }, { "name": "DSA-4235", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4235" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-18/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-18/" }, { "name": "RHSA-2018:2113", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2113" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-16/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-16/" }, { "name": "DSA-4244", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4244" }, { "name": "104560", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104560" }, { "name": "1041193", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041193" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-19/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-19/" }, { "name": "RHSA-2018:2252", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2252" }, { "name": "https://www.mozilla.org/security/advisories/mfsa2018-17/", "refsource": "CONFIRM", "url": "https://www.mozilla.org/security/advisories/mfsa2018-17/" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1464039", "refsource": "CONFIRM", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1464039" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1425-1] thunderbird security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html" }, { "name": "RHSA-2018:2251", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2251" }, { "name": "USN-3705-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3705-1/" }, { "name": "USN-3714-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3714-1/" }, { "name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1406-1] firefox-esr security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe", "assignerShortName": "mozilla", "cveId": "CVE-2018-12366", "datePublished": "2018-10-18T13:00:00", "dateReserved": "2018-06-14T00:00:00", "dateUpdated": "2024-08-05T08:30:59.988Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…