Vulnerabilities > CVE-2008-2785 - Numeric Errors vulnerability in Mozilla Firefox, Seamonkey and Thunderbird
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Mozilla Firefox before 2.0.0.16 and 3.x before 3.0.1, Thunderbird before 2.0.0.16, and SeaMonkey before 1.1.11 use an incorrect integer data type as a CSS object reference counter in the CSSValue array (aka nsCSSValue:Array) data structure, which allows remote attackers to execute arbitrary code via a large number of references to a common CSS object, leading to a counter overflow and a free of in-use memory, aka ZDI-CAN-349.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1621.NASL description Several remote vulnerabilities have been discovered in the Icedove mail client, an unbranded version of the Thunderbird client. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2008-0304 It was discovered that a buffer overflow in MIME decoding can lead to the execution of arbitrary code. - CVE-2008-2785 It was discovered that missing boundary checks on a reference counter for CSS objects can lead to the execution of arbitrary code. - CVE-2008-2798 Devon Hubbard, Jesse Ruderman and Martijn Wargers discovered crashes in the layout engine, which might allow the execution of arbitrary code. - CVE-2008-2799 Igor Bukanov, Jesse Ruderman and Gary Kwong discovered crashes in the JavaScript engine, which might allow the execution of arbitrary code. - CVE-2008-2802 last seen 2020-06-01 modified 2020-06-02 plugin id 33741 published 2008-07-28 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33741 title Debian DSA-1621-1 : icedove - several vulnerabilities NASL family Fedora Local Security Checks NASL id FEDORA_2008-6737.NASL description Updated thunderbird packages that fix several security issues are now available for Fedora 9. Several flaws were found in the processing of malformed HTML content. An HTML mail containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2008-2785, CVE-2008-2798, CVE-2008-2799, CVE-2008-2811) Multiple flaws were found in the processing of malformed JavaScript content. An HTML mail containing such malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2008-2802, CVE-2008-2803) A flaw was found in the way a malformed .properties file was processed by Thunderbird. A malicious extension could read uninitialized memory, possibly leaking sensitive data to the extension. (CVE-2008-2807) A flaw was found in the way Thunderbird displayed information about self-signed certificates. It was possible for a self-signed certificate to contain multiple alternate name entries, which were not all displayed to the user, allowing them to mistakenly extend trust to an unknown site. (CVE-2008-2809) Thunderbird was updated to upstream version 2.0.0.16 to address these flaws: http://www.mozilla.org/security/known- vulnerabilities/thunderbird20.html#thunderbird2.0.0.16 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 33842 published 2008-08-08 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33842 title Fedora 9 : thunderbird-2.0.0.16-1.fc9 (2008-6737) NASL family SuSE Local Security Checks NASL id SUSE_11_0_SEAMONKEY-080912.NASL description SeaMonkey was updated to version 1.1.11. Problems fixed in the 1.1.11 update: CVE-2008-2785 MFSA 2008-34: An anonymous researcher, via TippingPoint last seen 2020-06-01 modified 2020-06-02 plugin id 40129 published 2009-07-21 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/40129 title openSUSE Security Update : seamonkey (seamonkey-193) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-626-1.NASL description A flaw was discovered in the browser engine. A variable could be made to overflow causing the browser to crash. If a user were tricked into opening a malicious web page, an attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2008-2785) Billy Rios discovered that Firefox and xulrunner, as used by browsers such as Epiphany, did not properly perform URI splitting with pipe symbols when passed a command-line URI. If Firefox or xulrunner were passed a malicious URL, an attacker may be able to execute local content with chrome privileges. (CVE-2008-2933). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 33758 published 2008-07-29 reporter Ubuntu Security Notice (C) 2008-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33758 title Ubuntu 8.04 LTS : firefox-3.0, xulrunner-1.9 vulnerabilities (USN-626-1) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1615.NASL description Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2008-2785 It was discovered that missing boundary checks on a reference counter for CSS objects can lead to the execution of arbitrary code. - CVE-2008-2798 Devon Hubbard, Jesse Ruderman and Martijn Wargers discovered crashes in the layout engine, which might allow the execution of arbitrary code. - CVE-2008-2799 Igor Bukanov, Jesse Ruderman and Gary Kwong discovered crashes in the JavaScript engine, which might allow the execution of arbitrary code. - CVE-2008-2800 last seen 2020-06-01 modified 2020-06-02 plugin id 33567 published 2008-07-24 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33567 title Debian DSA-1615-1 : xulrunner - several vulnerabilities NASL family Scientific Linux Local Security Checks NASL id SL_20080723_THUNDERBIRD_ON_SL4_X.NASL description Multiple flaws were found in the processing of malformed JavaScript content. An HTML mail containing such malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803) Several flaws were found in the processing of malformed HTML content. An HTML mail containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2008-2785, CVE-2008-2798, CVE-2008-2799, CVE-2008-2811) Several flaws were found in the way malformed HTML content was displayed. An HTML mail containing specially crafted content could, potentially, trick a Thunderbird user into surrendering sensitive information. (CVE-2008-2800) Two local file disclosure flaws were found in Thunderbird. An HTML mail containing malicious content could cause Thunderbird to reveal the contents of a local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810) A flaw was found in the way a malformed .properties file was processed by Thunderbird. A malicious extension could read uninitialized memory, possibly leaking sensitive data to the extension. (CVE-2008-2807) A flaw was found in the way Thunderbird escaped a listing of local file names. If a user could be tricked into listing a local directory containing malicious file names, arbitrary JavaScript could be run with the permissions of the user running Thunderbird. (CVE-2008-2808) A flaw was found in the way Thunderbird displayed information about self-signed certificates. It was possible for a self-signed certificate to contain multiple alternate name entries, which were not all displayed to the user, allowing them to mistakenly extend trust to an unknown site. (CVE-2008-2809) Note: JavaScript support is disabled by default in Thunderbird. The above issues are not exploitable unless JavaScript is enabled. last seen 2020-06-01 modified 2020-06-02 plugin id 60449 published 2012-08-01 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/60449 title Scientific Linux Security Update : thunderbird on SL4.x, SL5.x i386/x86_64 NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2008-0599.NASL description Updated SeaMonkey packages that fix a security issue are now available for Red Hat Enterprise Linux 2.1, 3, and 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. [Updated 16th July 2008] The original set of packages for Red Hat Enterprise Linux 4 were missing the seamonkey-nss and seamonkey-nspr packages. This errata was updated to add these missing packages. SeaMonkey is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor. An integer overflow flaw was found in the way SeaMonkey displayed certain web content. A malicious website could cause SeaMonkey to crash or execute arbitrary code with the permissions of the user running SeaMonkey. (CVE-2008-2785) All seamonkey users should upgrade to these updated packages, which contain a backported patch to resolve this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 33530 published 2008-07-17 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33530 title RHEL 2.1 / 3 / 4 : seamonkey (RHSA-2008:0599) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2008-0599.NASL description From Red Hat Security Advisory 2008:0599 : Updated SeaMonkey packages that fix a security issue are now available for Red Hat Enterprise Linux 2.1, 3, and 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. [Updated 16th July 2008] The original set of packages for Red Hat Enterprise Linux 4 were missing the seamonkey-nss and seamonkey-nspr packages. This errata was updated to add these missing packages. SeaMonkey is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor. An integer overflow flaw was found in the way SeaMonkey displayed certain web content. A malicious website could cause SeaMonkey to crash or execute arbitrary code with the permissions of the user running SeaMonkey. (CVE-2008-2785) All seamonkey users should upgrade to these updated packages, which contain a backported patch to resolve this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 67728 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67728 title Oracle Linux 3 / 4 : seamonkey (ELSA-2008-0599) NASL family Fedora Local Security Checks NASL id FEDORA_2008-6517.NASL description Updated seamonkey packages that fix several security issues are now available for Fedora 8. An integer overflow flaw was found in the way SeaMonkey displayed certain web content. A malicious website could cause SeaMonkey to crash, or execute arbitrary code with the permissions of the user running SeaMonkey. (CVE-2008-2785) Updated packages update SeaMonkey to upstream version 1.1.11 to address this flaw: http://www.mozilla.org/security/known- vulnerabilities/seamonkey11.html#seamonkey1.1.11 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 33541 published 2008-07-18 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33541 title Fedora 8 : seamonkey-1.1.11-1.fc8 (2008-6517) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200808-03.NASL description The remote host is affected by the vulnerability described in GLSA-200808-03 (Mozilla products: Multiple vulnerabilities) The following vulnerabilities were reported in all mentioned Mozilla products: TippingPoint last seen 2020-06-01 modified 2020-06-02 plugin id 33833 published 2008-08-07 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33833 title GLSA-200808-03 : Mozilla products: Multiple vulnerabilities NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2008-0616.NASL description Updated thunderbird packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Mozilla Thunderbird is a standalone mail and newsgroup client. Multiple flaws were found in the processing of malformed JavaScript content. An HTML mail containing such malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803) Several flaws were found in the processing of malformed HTML content. An HTML mail containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2008-2785, CVE-2008-2798, CVE-2008-2799, CVE-2008-2811) Several flaws were found in the way malformed HTML content was displayed. An HTML mail containing specially crafted content could, potentially, trick a Thunderbird user into surrendering sensitive information. (CVE-2008-2800) Two local file disclosure flaws were found in Thunderbird. An HTML mail containing malicious content could cause Thunderbird to reveal the contents of a local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810) A flaw was found in the way a malformed .properties file was processed by Thunderbird. A malicious extension could read uninitialized memory, possibly leaking sensitive data to the extension. (CVE-2008-2807) A flaw was found in the way Thunderbird escaped a listing of local file names. If a user could be tricked into listing a local directory containing malicious file names, arbitrary JavaScript could be run with the permissions of the user running Thunderbird. (CVE-2008-2808) A flaw was found in the way Thunderbird displayed information about self-signed certificates. It was possible for a self-signed certificate to contain multiple alternate name entries, which were not all displayed to the user, allowing them to mistakenly extend trust to an unknown site. (CVE-2008-2809) Note: JavaScript support is disabled by default in Thunderbird. The above issues are not exploitable unless JavaScript is enabled. All Thunderbird users should upgrade to these updated packages, which contain backported patches to resolve these issues. last seen 2020-06-01 modified 2020-06-02 plugin id 43702 published 2010-01-06 reporter This script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/43702 title CentOS 4 / 5 : thunderbird (CESA-2008:0616) NASL family SuSE Local Security Checks NASL id SUSE_11_0_MOZILLAFIREFOX-080731.NASL description This update brings Mozilla Firefox to version 3.0.1. It fixes various bugs and also following security problems : MFSA 2008-34 / CVE-2008-2785: An anonymous researcher, via TippingPoint last seen 2020-06-01 modified 2020-06-02 plugin id 39882 published 2009-07-21 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/39882 title openSUSE Security Update : MozillaFirefox (MozillaFirefox-125) NASL family SuSE Local Security Checks NASL id SUSE_MOZILLATHUNDERBIRD-5680.NASL description This patch backports security fixes found in MozillaThunderbird 2.0.0.17 back to the 1.5 Thunderbird used in openSUSE 10.2. MFSA 2008-34 / CVE-2008-2785: An anonymous researcher, via TippingPoint last seen 2020-06-01 modified 2020-06-02 plugin id 34428 published 2008-10-16 reporter This script is Copyright (C) 2008-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/34428 title openSUSE 10 Security Update : MozillaThunderbird (MozillaThunderbird-5680) NASL family Mandriva Local Security Checks NASL id MANDRIVA_MDVSA-2008-155.NASL description A number of security vulnerabilities have been discovered and corrected in the latest Mozilla Thunderbird program, version 2.0.0.16 (CVE-2008-1233, CVE-2008-1234, CVE-2008-1235, CVE-2008-1236, CVE-2008-1237, CVE-2008-2785, CVE-2008-2798, CVE-2008-2799, CVE-2008-2802, CVE-2008-2803, CVE-2008-2807, CVE-2008-2809, CVE-2008-2811). This update provides the latest Thunderbird to correct these issues. It also provides Thunderbird 2.x for Corporate 3.0 systems. Update : The previous update provided the incorrect version of the enigmail locale files. This version correctly builds them for Thunderbird 2.0.0.16. last seen 2020-06-01 modified 2020-06-02 plugin id 36242 published 2009-04-23 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/36242 title Mandriva Linux Security Advisory : mozilla-thunderbird (MDVSA-2008:155-1) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-629-1.NASL description Various flaws were discovered in the browser engine. If a user had JavaScript enabled and were tricked into opening a malicious web page, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2008-2798, CVE-2008-2799) It was discovered that Thunderbird would allow non-privileged XUL documents to load chrome scripts from the fastload file if JavaScript was enabled. This could allow an attacker to execute arbitrary JavaScript code with chrome privileges. (CVE-2008-2802) A flaw was discovered in Thunderbird that allowed overwriting trusted objects via mozIJSSubScriptLoader.loadSubScript(). If a user had JavaScript enabled and was tricked into opening a malicious web page, an attacker could execute arbitrary code with the privileges of the user invoking the program. (CVE-2008-2803) Daniel Glazman found that an improperly encoded .properties file in an add-on can result in uninitialized memory being used. If a user were tricked into installing a malicious add-on, Thunderbird may be able to see data from other programs. (CVE-2008-2807) John G. Myers discovered a weakness in the trust model used by Thunderbird regarding alternate names on self-signed certificates. If a user were tricked into accepting a certificate containing alternate name entries, an attacker could impersonate another server. (CVE-2008-2809) A vulnerability was discovered in the block reflow code of Thunderbird. If a user enabled JavaScript, this vulnerability could be used by an attacker to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking the program. (CVE-2008-2811) A flaw was discovered in the browser engine. A variable could be made to overflow causing Thunderbird to crash. If a user enable JavaScript and was tricked into opening a malicious web page, an attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2008-2785) Mozilla developers audited the MIME handling code looking for similar vulnerabilities to the previously fixed CVE-2008-0304, and changed several function calls to use safer versions of string routines. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 33587 published 2008-07-25 reporter Ubuntu Security Notice (C) 2008-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33587 title Ubuntu 6.06 LTS / 7.04 / 7.10 / 8.04 LTS : mozilla-thunderbird, thunderbird vulnerabilities (USN-629-1) NASL family Slackware Local Security Checks NASL id SLACKWARE_SSA_2008-198-02.NASL description New seamonkey packages are available for Slackware 11.0, 12.0, 12.1, and -current to fix security issues. last seen 2020-06-01 modified 2020-06-02 plugin id 33534 published 2008-07-18 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33534 title Slackware 11.0 / 12.0 / 12.1 / current : seamonkey (SSA:2008-198-02) NASL family SuSE Local Security Checks NASL id SUSE_SEAMONKEY-5600.NASL description SeaMonkey was updated to version 1.1.11. Problems fixed in the 1.1.11 update: CVE-2008-2785 MFSA 2008-34: An anonymous researcher, via TippingPoint last seen 2020-06-01 modified 2020-06-02 plugin id 34201 published 2008-09-14 reporter This script is Copyright (C) 2008-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/34201 title openSUSE 10 Security Update : seamonkey (seamonkey-5600) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2008-0598.NASL description From Red Hat Security Advisory 2008:0598 : An updated firefox package that fixes various security issues is now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. Mozilla Firefox is an open source Web browser. An integer overflow flaw was found in the way Firefox displayed certain web content. A malicious website could cause Firefox to crash, or execute arbitrary code with the permissions of the user running Firefox. (CVE-2008-2785) A flaw was found in the way Firefox handled certain command line URLs. If another application passed Firefox a malformed URL, it could result in Firefox executing local malicious content with chrome privileges. (CVE-2008-2933) All firefox users should upgrade to this updated package, which contains backported patches that correct these issues. last seen 2020-06-01 modified 2020-06-02 plugin id 67727 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67727 title Oracle Linux 4 : firefox (ELSA-2008-0598) NASL family Mandriva Local Security Checks NASL id MANDRIVA_MDVSA-2008-148.NASL description Security vulnerabilities have been discovered and corrected in the latest Mozilla Firefox program, version 2.0.0.16 (CVE-2008-2785, CVE-2008-2933). This update provides the latest Firefox to correct these issues. last seen 2020-06-01 modified 2020-06-02 plugin id 37515 published 2009-04-23 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/37515 title Mandriva Linux Security Advisory : mozilla-firefox (MDVSA-2008:148) NASL family Windows NASL id MOZILLA_THUNDERBIRD_20016.NASL description The installed version of Thunderbird is affected by various security issues : - Several stability bugs exist leading to crashes which, in some cases, show traces of memory corruption (MFSA 2008-21). - By taking advantage of the privilege level stored in the pre-compiled last seen 2020-06-01 modified 2020-06-02 plugin id 33563 published 2008-07-24 reporter This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/33563 title Mozilla Thunderbird < 2.0.0.16 Multiple Vulnerabilities NASL family Fedora Local Security Checks NASL id FEDORA_2008-6706.NASL description Updated thunderbird packages that fix several security issues are now available for Fedora 8. Several flaws were found in the processing of malformed HTML content. An HTML mail containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2008-2785, CVE-2008-2798, CVE-2008-2799, CVE-2008-2811) Multiple flaws were found in the processing of malformed JavaScript content. An HTML mail containing such malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2008-2802, CVE-2008-2803) A flaw was found in the way a malformed .properties file was processed by Thunderbird. A malicious extension could read uninitialized memory, possibly leaking sensitive data to the extension. (CVE-2008-2807) A flaw was found in the way Thunderbird displayed information about self-signed certificates. It was possible for a self-signed certificate to contain multiple alternate name entries, which were not all displayed to the user, allowing them to mistakenly extend trust to an unknown site. (CVE-2008-2809) Thunderbird was updated to upstream version 2.0.0.16 to address these flaws: http://www.mozilla.org/security/known- vulnerabilities/thunderbird20.html#thunderbird2.0.0.16 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 33841 published 2008-08-08 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33841 title Fedora 8 : thunderbird-2.0.0.16-1.fc8 (2008-6706) NASL family Windows NASL id SEAMONKEY_1111.NASL description The installed version of SeaMonkey may allow a remote attacker to execute arbitrary code on the remote host by creating a very large number of references to a common CSS object, which can lead to an overflow the CSS reference counter, causing a crash when the browser attempts to free the CSS object while still in use. last seen 2020-06-01 modified 2020-06-02 plugin id 33506 published 2008-07-16 reporter This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/33506 title SeaMonkey < 1.1.11 CSSValue Array Memory Corruption NASL family Windows NASL id MOZILLA_FIREFOX_20016.NASL description The installed version of Firefox is affected by various security issues : - By creating a very large number of references to a common CSS object, an attacker can overflow the CSS reference counter, causing a crash when the browser attempts to free the CSS object while still in use and allowing for arbitrary code execution (MFSA 2008-34). - If Firefox is not already running, passing it a command-line URI with pipe ( last seen 2020-06-01 modified 2020-06-02 plugin id 33505 published 2008-07-16 reporter This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/33505 title Firefox < 2.0.0.16 / 3.0.1 Multiple Vulnerabilities NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2008-0616.NASL description From Red Hat Security Advisory 2008:0616 : Updated thunderbird packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Mozilla Thunderbird is a standalone mail and newsgroup client. Multiple flaws were found in the processing of malformed JavaScript content. An HTML mail containing such malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803) Several flaws were found in the processing of malformed HTML content. An HTML mail containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2008-2785, CVE-2008-2798, CVE-2008-2799, CVE-2008-2811) Several flaws were found in the way malformed HTML content was displayed. An HTML mail containing specially crafted content could, potentially, trick a Thunderbird user into surrendering sensitive information. (CVE-2008-2800) Two local file disclosure flaws were found in Thunderbird. An HTML mail containing malicious content could cause Thunderbird to reveal the contents of a local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810) A flaw was found in the way a malformed .properties file was processed by Thunderbird. A malicious extension could read uninitialized memory, possibly leaking sensitive data to the extension. (CVE-2008-2807) A flaw was found in the way Thunderbird escaped a listing of local file names. If a user could be tricked into listing a local directory containing malicious file names, arbitrary JavaScript could be run with the permissions of the user running Thunderbird. (CVE-2008-2808) A flaw was found in the way Thunderbird displayed information about self-signed certificates. It was possible for a self-signed certificate to contain multiple alternate name entries, which were not all displayed to the user, allowing them to mistakenly extend trust to an unknown site. (CVE-2008-2809) Note: JavaScript support is disabled by default in Thunderbird. The above issues are not exploitable unless JavaScript is enabled. All Thunderbird users should upgrade to these updated packages, which contain backported patches to resolve these issues. last seen 2020-06-01 modified 2020-06-02 plugin id 67731 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67731 title Oracle Linux 4 : thunderbird (ELSA-2008-0616) NASL family Fedora Local Security Checks NASL id FEDORA_2008-6519.NASL description Updated seamonkey packages that fix several security issues are now available for Fedora 9. An integer overflow flaw was found in the way SeaMonkey displayed certain web content. A malicious website could cause SeaMonkey to crash, or execute arbitrary code with the permissions of the user running SeaMonkey. (CVE-2008-2785) Updated packages update SeaMonkey to upstream version 1.1.11 to address this flaw: http://www.mozilla.org/security/known- vulnerabilities/seamonkey11.html#seamonkey1.1.11 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 33543 published 2008-07-18 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33543 title Fedora 9 : seamonkey-1.1.11-1.fc9 (2008-6519) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2008-0597.NASL description Updated firefox packages that fix various security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. [Updated 16th July 2008] The nspluginwrapper package has been added to this advisory to satisfy a missing package dependency issue. Mozilla Firefox is an open source Web browser. An integer overflow flaw was found in the way Firefox displayed certain web content. A malicious website could cause Firefox to crash, or execute arbitrary code with the permissions of the user running Firefox. (CVE-2008-2785) A flaw was found in the way Firefox handled certain command line URLs. If another application passed Firefox a malformed URL, it could result in Firefox executing local malicious content with chrome privileges. (CVE-2008-2933) All firefox users should upgrade to these updated packages, which contain Firefox 3.0.1 that corrects these issues. last seen 2020-06-01 modified 2020-06-02 plugin id 43699 published 2010-01-06 reporter This script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/43699 title CentOS 5 : firefox (CESA-2008:0597) NASL family SuSE Local Security Checks NASL id SUSE_MOZILLAFIREFOX-5449.NASL description MozillaFirefox was updated to version 2.0.0.16, which fixes various bugs and following security issues : MFSA 2008-34 CVE-2008-2785: An anonymous researcher, via TippingPoint last seen 2020-06-01 modified 2020-06-02 plugin id 33756 published 2008-07-29 reporter This script is Copyright (C) 2008-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/33756 title openSUSE 10 Security Update : MozillaFirefox (MozillaFirefox-5449) NASL family Slackware Local Security Checks NASL id SLACKWARE_SSA_2008-198-01.NASL description New mozilla-firefox packages are available for Slackware 10.2, 11.0, 12.0, and 12.1 to fix security issues. last seen 2020-06-01 modified 2020-06-02 plugin id 33533 published 2008-07-18 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33533 title Slackware 10.2 / 11.0 / 12.0 / 12.1 : mozilla-firefox (SSA:2008-198-01) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2008-0598.NASL description An updated firefox package that fixes various security issues is now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. Mozilla Firefox is an open source Web browser. An integer overflow flaw was found in the way Firefox displayed certain web content. A malicious website could cause Firefox to crash, or execute arbitrary code with the permissions of the user running Firefox. (CVE-2008-2785) A flaw was found in the way Firefox handled certain command line URLs. If another application passed Firefox a malformed URL, it could result in Firefox executing local malicious content with chrome privileges. (CVE-2008-2933) All firefox users should upgrade to this updated package, which contains backported patches that correct these issues. last seen 2020-06-01 modified 2020-06-02 plugin id 33529 published 2008-07-17 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33529 title RHEL 4 : firefox (RHSA-2008:0598) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1697.NASL description Several remote vulnerabilities have been discovered in Iceape an unbranded version of the SeaMonkey internet suite. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2008-0016 Justin Schuh, Tom Cross and Peter Williams discovered a buffer overflow in the parser for UTF-8 URLs, which may lead to the execution of arbitrary code. (MFSA 2008-37) - CVE-2008-0304 It was discovered that a buffer overflow in MIME decoding can lead to the execution of arbitrary code. (MFSA 2008-26) - CVE-2008-2785 It was discovered that missing boundary checks on a reference counter for CSS objects can lead to the execution of arbitrary code. (MFSA 2008-34) - CVE-2008-2798 Devon Hubbard, Jesse Ruderman and Martijn Wargers discovered crashes in the layout engine, which might allow the execution of arbitrary code. (MFSA 2008-21) - CVE-2008-2799 Igor Bukanov, Jesse Ruderman and Gary Kwong discovered crashes in the JavaScript engine, which might allow the execution of arbitrary code. (MFSA 2008-21) - CVE-2008-2800 last seen 2020-06-01 modified 2020-06-02 plugin id 35314 published 2009-01-08 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/35314 title Debian DSA-1697-1 : iceape - several vulnerabilities NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2008-0616.NASL description Updated thunderbird packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Mozilla Thunderbird is a standalone mail and newsgroup client. Multiple flaws were found in the processing of malformed JavaScript content. An HTML mail containing such malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803) Several flaws were found in the processing of malformed HTML content. An HTML mail containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code as the user running Thunderbird. (CVE-2008-2785, CVE-2008-2798, CVE-2008-2799, CVE-2008-2811) Several flaws were found in the way malformed HTML content was displayed. An HTML mail containing specially crafted content could, potentially, trick a Thunderbird user into surrendering sensitive information. (CVE-2008-2800) Two local file disclosure flaws were found in Thunderbird. An HTML mail containing malicious content could cause Thunderbird to reveal the contents of a local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810) A flaw was found in the way a malformed .properties file was processed by Thunderbird. A malicious extension could read uninitialized memory, possibly leaking sensitive data to the extension. (CVE-2008-2807) A flaw was found in the way Thunderbird escaped a listing of local file names. If a user could be tricked into listing a local directory containing malicious file names, arbitrary JavaScript could be run with the permissions of the user running Thunderbird. (CVE-2008-2808) A flaw was found in the way Thunderbird displayed information about self-signed certificates. It was possible for a self-signed certificate to contain multiple alternate name entries, which were not all displayed to the user, allowing them to mistakenly extend trust to an unknown site. (CVE-2008-2809) Note: JavaScript support is disabled by default in Thunderbird. The above issues are not exploitable unless JavaScript is enabled. All Thunderbird users should upgrade to these updated packages, which contain backported patches to resolve these issues. last seen 2020-06-01 modified 2020-06-02 plugin id 33571 published 2008-07-24 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33571 title RHEL 4 / 5 : thunderbird (RHSA-2008:0616) NASL family SuSE Local Security Checks NASL id SUSE_11_0_MOZILLATHUNDERBIRD-080912.NASL description Mozilla Thunderbird was updated to 2.0.0.16. MFSA 2008-34 / CVE-2008-2785: An anonymous researcher, via TippingPoint last seen 2020-06-01 modified 2020-06-02 plugin id 39892 published 2009-07-21 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/39892 title openSUSE Security Update : MozillaThunderbird (MozillaThunderbird-192) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2008-0597.NASL description Updated firefox packages that fix various security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. [Updated 16th July 2008] The nspluginwrapper package has been added to this advisory to satisfy a missing package dependency issue. Mozilla Firefox is an open source Web browser. An integer overflow flaw was found in the way Firefox displayed certain web content. A malicious website could cause Firefox to crash, or execute arbitrary code with the permissions of the user running Firefox. (CVE-2008-2785) A flaw was found in the way Firefox handled certain command line URLs. If another application passed Firefox a malformed URL, it could result in Firefox executing local malicious content with chrome privileges. (CVE-2008-2933) All firefox users should upgrade to these updated packages, which contain Firefox 3.0.1 that corrects these issues. last seen 2020-06-01 modified 2020-06-02 plugin id 33528 published 2008-07-17 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33528 title RHEL 5 : firefox (RHSA-2008:0597) NASL family SuSE Local Security Checks NASL id SUSE_MOZILLATHUNDERBIRD-5599.NASL description Mozilla Thunderbird was updated to 2.0.0.16. MFSA 2008-34 / CVE-2008-2785: An anonymous researcher, via TippingPoint last seen 2020-06-01 modified 2020-06-02 plugin id 34198 published 2008-09-14 reporter This script is Copyright (C) 2008-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/34198 title openSUSE 10 Security Update : MozillaThunderbird (MozillaThunderbird-5599) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-626-2.NASL description USN-626-1 fixed vulnerabilities in xulrunner-1.9. The changes required that Devhelp, Epiphany, Midbrowser and Yelp also be updated to use the new xulrunner-1.9. A flaw was discovered in the browser engine. A variable could be made to overflow causing the browser to crash. If a user were tricked into opening a malicious web page, an attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2008-2785) Billy Rios discovered that Firefox and xulrunner, as used by browsers such as Epiphany, did not properly perform URI splitting with pipe symbols when passed a command-line URI. If Firefox or xulrunner were passed a malicious URL, an attacker may be able to execute local content with chrome privileges. (CVE-2008-2933). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 33827 published 2008-08-05 reporter Ubuntu Security Notice (C) 2008-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33827 title Ubuntu 8.04 LTS : devhelp, epiphany-browser, midbrowser, yelp update (USN-626-2) NASL family Fedora Local Security Checks NASL id FEDORA_2008-6491.NASL description Updated firefox packages that fix several security issues are now available for Fedora 8. An integer overflow flaw was found in the way Firefox displayed certain web content. A malicious website could cause Firefox to crash, or execute arbitrary code with the permissions of the user running Firefox. (CVE-2008-2785) A flaw was found in the way Firefox handled certain command line URLs. If another application passed Firefox a malformed URL, it could result in Firefox executing local malicious content with chrome privileges. (CVE-2008-2933) Updated packages update Mozilla Firefox to upstream version 2.0.0.16 to address these flaws: http://www.mozilla.org/security/known- vulnerabilities/firefox20.html#firefox2.0.0.16 This update also contains blam, cairo-dock, chmsee, devhelp, epiphany, epiphany-extensions, galeon, gnome- python2-extras, gnome-web-photo, gtkmozembedmm, kazehakase, liferea, Miro, openvrml, ruby-gnome2 and yelp packages rebuilt against new Firefox / Gecko libraries. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 33539 published 2008-07-18 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33539 title Fedora 8 : Miro-1.2.3-3.fc8 / blam-1.8.3-17.fc8 / cairo-dock-1.6.1.1-1.fc8.1 / chmsee-1.0.0-3.31.fc8 / etc (2008-6491) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2008-0598.NASL description An updated firefox package that fixes various security issues is now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. Mozilla Firefox is an open source Web browser. An integer overflow flaw was found in the way Firefox displayed certain web content. A malicious website could cause Firefox to crash, or execute arbitrary code with the permissions of the user running Firefox. (CVE-2008-2785) A flaw was found in the way Firefox handled certain command line URLs. If another application passed Firefox a malformed URL, it could result in Firefox executing local malicious content with chrome privileges. (CVE-2008-2933) All firefox users should upgrade to this updated package, which contains backported patches that correct these issues. last seen 2020-06-01 modified 2020-06-02 plugin id 33525 published 2008-07-17 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33525 title CentOS 4 : firefox (CESA-2008:0598) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2008-0599.NASL description Updated SeaMonkey packages that fix a security issue are now available for Red Hat Enterprise Linux 2.1, 3, and 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. [Updated 16th July 2008] The original set of packages for Red Hat Enterprise Linux 4 were missing the seamonkey-nss and seamonkey-nspr packages. This errata was updated to add these missing packages. SeaMonkey is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor. An integer overflow flaw was found in the way SeaMonkey displayed certain web content. A malicious website could cause SeaMonkey to crash or execute arbitrary code with the permissions of the user running SeaMonkey. (CVE-2008-2785) All seamonkey users should upgrade to these updated packages, which contain a backported patch to resolve this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 33526 published 2008-07-17 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33526 title CentOS 3 / 4 : seamonkey (CESA-2008:0599) NASL family Scientific Linux Local Security Checks NASL id SL_20080716_FIREFOX_ON_SL5_X.NASL description An integer overflow flaw was found in the way Firefox displayed certain web content. A malicious website could cause Firefox to crash, or execute arbitrary code with the permissions of the user running Firefox. (CVE-2008-2785) A flaw was found in the way Firefox handled certain command line URLs. If another application passed Firefox a malformed URL, it could result in Firefox executing local malicious content with chrome privileges. (CVE-2008-2933) last seen 2020-06-01 modified 2020-06-02 plugin id 60443 published 2012-08-01 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/60443 title Scientific Linux Security Update : firefox on SL5.x i386/x86_64 NASL family Slackware Local Security Checks NASL id SLACKWARE_SSA_2008-210-05.NASL description New mozilla-thunderbird packages are available for Slackware 10.2, 11.0, 12.0, 12.1, and -current to fix security issues. last seen 2020-06-01 modified 2020-06-02 plugin id 33750 published 2008-07-29 reporter This script is Copyright (C) 2008-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/33750 title Slackware 10.2 / 11.0 / 12.0 / 12.1 / current : mozilla-thunderbird (SSA:2008-210-05) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1614.NASL description Several remote vulnerabilities have been discovered in the Iceweasel web browser, an unbranded version of the Firefox browser. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2008-2785 It was discovered that missing boundary checks on a reference counter for CSS objects can lead to the execution of arbitrary code. - CVE-2008-2933 Billy Rios discovered that passing an URL containing a pipe symbol to Iceweasel can lead to Chrome privilege escalation. last seen 2020-06-01 modified 2020-06-02 plugin id 33566 published 2008-07-24 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33566 title Debian DSA-1614-1 : iceweasel - several vulnerabilities NASL family Scientific Linux Local Security Checks NASL id SL_20080716_SEAMONKEY_ON_SL4_X.NASL description An integer overflow flaw was found in the way SeaMonkey displayed certain web content. A malicious website could cause SeaMonkey to crash or execute arbitrary code with the permissions of the user running SeaMonkey. (CVE-2008-2785) last seen 2020-06-01 modified 2020-06-02 plugin id 60447 published 2012-08-01 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/60447 title Scientific Linux Security Update : seamonkey on SL4.x i386/x86_64 NASL family Windows NASL id MOZILLA_FIREFOX_301.NASL description The installed version of Firefox is affected by various security issues : - By creating a very large number of references to a common CSS object, an attacker can overflow the CSS reference counter, causing a crash when the browser attempts to free the CSS object while still in use and allowing for arbitrary code execution (MFSA 2008-34). - If Firefox is not already running, passing it a command-line URI with pipe ( last seen 2020-06-01 modified 2020-06-02 plugin id 33522 published 2008-07-17 reporter This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/33522 title Firefox 3.x < 3.0.1 Multiple Vulnerabilities NASL family Scientific Linux Local Security Checks NASL id SL_20080716_SEAMONKEY_ON_SL3_X.NASL description An integer overflow flaw was found in the way SeaMonkey displayed certain web content. A malicious website could cause SeaMonkey to crash or execute arbitrary code with the permissions of the user running SeaMonkey. (CVE-2008-2785) last seen 2020-06-01 modified 2020-06-02 plugin id 60446 published 2012-08-01 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/60446 title Scientific Linux Security Update : seamonkey on SL3.x i386/x86_64 NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-623-1.NASL description A flaw was discovered in the browser engine. A variable could be made to overflow causing the browser to crash. If a user were tricked into opening a malicious web page, an attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2008-2785) Billy Rios discovered that Firefox did not properly perform URI splitting with pipe symbols when passed a command-line URI. If Firefox were passed a malicious URL, an attacker may be able to execute local content with chrome privileges. (CVE-2008-2933). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 33544 published 2008-07-18 reporter Ubuntu Security Notice (C) 2008-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33544 title Ubuntu 6.06 LTS / 7.04 / 7.10 : firefox vulnerabilities (USN-623-1) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2008-0597.NASL description From Red Hat Security Advisory 2008:0597 : Updated firefox packages that fix various security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. [Updated 16th July 2008] The nspluginwrapper package has been added to this advisory to satisfy a missing package dependency issue. Mozilla Firefox is an open source Web browser. An integer overflow flaw was found in the way Firefox displayed certain web content. A malicious website could cause Firefox to crash, or execute arbitrary code with the permissions of the user running Firefox. (CVE-2008-2785) A flaw was found in the way Firefox handled certain command line URLs. If another application passed Firefox a malformed URL, it could result in Firefox executing local malicious content with chrome privileges. (CVE-2008-2933) All firefox users should upgrade to these updated packages, which contain Firefox 3.0.1 that corrects these issues. last seen 2020-06-01 modified 2020-06-02 plugin id 67726 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67726 title Oracle Linux 5 : firefox (ELSA-2008-0597) NASL family Fedora Local Security Checks NASL id FEDORA_2008-6518.NASL description Updated firefox packages that fix several security issues are now available for Fedora 9. An integer overflow flaw was found in the way Firefox displayed certain web content. A malicious website could cause Firefox to crash, or execute arbitrary code with the permissions of the user running Firefox. (CVE-2008-2785) A flaw was found in the way Firefox handled certain command line URLs. If another application passed Firefox a malformed URL, it could result in Firefox executing local malicious content with chrome privileges. (CVE-2008-2933) Updated packages update Mozilla Firefox to upstream version 3.0.1 to address these flaws: http://www.mozilla.org/security/known- vulnerabilities/firefox30.html#firefox3.0.1 This update also contains devhelp, epiphany, epiphany-extensions, and yelp packages rebuilt against new Firefox / Gecko libraries. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 33542 published 2008-07-18 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33542 title Fedora 9 : devhelp-0.19.1-3.fc9 / epiphany-2.22.2-3.fc9 / epiphany-extensions-2.22.1-3.fc9 / etc (2008-6518) NASL family SuSE Local Security Checks NASL id SUSE_MOZILLAFIREFOX-5450.NASL description MozillaFirefox was updated to version 2.0.0.16, which fixes various bugs and following security issues : - An anonymous researcher, via TippingPoint last seen 2020-06-01 modified 2020-06-02 plugin id 33757 published 2008-07-29 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33757 title SuSE 10 Security Update : MozillaFirefox (ZYPP Patch Number 5450)
Oval
accepted | 2013-04-29T04:23:10.449-04:00 | ||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||
description | Mozilla Firefox before 2.0.0.16 and 3.x before 3.0.1, Thunderbird before 2.0.0.16, and SeaMonkey before 1.1.11 use an incorrect integer data type as a CSS object reference counter in the CSSValue array (aka nsCSSValue:Array) data structure, which allows remote attackers to execute arbitrary code via a large number of references to a common CSS object, leading to a counter overflow and a free of in-use memory, aka ZDI-CAN-349. | ||||||||||||||||||||||||||||||||
family | unix | ||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:9900 | ||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||
submitted | 2010-07-09T03:56:16-04:00 | ||||||||||||||||||||||||||||||||
title | Mozilla Firefox before 2.0.0.16 and 3.x before 3.0.1, Thunderbird before 2.0.0.16, and SeaMonkey before 1.1.11 use an incorrect integer data type as a CSS object reference counter in the CSSValue array (aka nsCSSValue:Array) data structure, which allows remote attackers to execute arbitrary code via a large number of references to a common CSS object, leading to a counter overflow and a free of in-use memory, aka ZDI-CAN-349. | ||||||||||||||||||||||||||||||||
version | 27 |
Redhat
advisories |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
rpms |
|
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 29802 CVE(CAN) ID: CVE-2008-2785 Firefox是一款流行的开源WEB浏览器。 Mozilla的内部CSSValue数组数据结构对CSS对象的引用计数器使用了过小的变量, 如果攻击者对常见的CSS对象创建了大量引用的话,当浏览器试图释放仍在使用的CSS对象时计数器会被溢出,导致拒绝服务或在用户机器上执行任意指令。 Mozilla Firefox 3.0.1 Mozilla ------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: <a href=http://www.mozilla.org/ target=_blank>http://www.mozilla.org/</a> RedHat ------ RedHat已经为此发布了一个安全公告(RHSA-2008:0599-01)以及相应补丁: RHSA-2008:0599-01:Critical: seamonkey security update 链接:<a href=https://www.redhat.com/support/errata/RHSA-2008-0599.html target=_blank>https://www.redhat.com/support/errata/RHSA-2008-0599.html</a> |
id | SSV:3668 |
last seen | 2017-11-19 |
modified | 2008-07-17 |
published | 2008-07-17 |
reporter | Root |
title | Firefox CSSValue数组数据结构远程代码执行漏洞 |
References
- http://blog.mozilla.com/security/2008/06/18/new-security-issue-under-investigation/
- http://blog.mozilla.com/security/2008/06/18/new-security-issue-under-investigation/
- http://dvlabs.tippingpoint.com/blog/2008/06/18/vulnerability-in-mozilla-firefox-30
- http://dvlabs.tippingpoint.com/blog/2008/06/18/vulnerability-in-mozilla-firefox-30
- http://rhn.redhat.com/errata/RHSA-2008-0616.html
- http://rhn.redhat.com/errata/RHSA-2008-0616.html
- http://secunia.com/advisories/30761
- http://secunia.com/advisories/30761
- http://secunia.com/advisories/31121
- http://secunia.com/advisories/31121
- http://secunia.com/advisories/31122
- http://secunia.com/advisories/31122
- http://secunia.com/advisories/31129
- http://secunia.com/advisories/31129
- http://secunia.com/advisories/31144
- http://secunia.com/advisories/31144
- http://secunia.com/advisories/31145
- http://secunia.com/advisories/31145
- http://secunia.com/advisories/31154
- http://secunia.com/advisories/31154
- http://secunia.com/advisories/31157
- http://secunia.com/advisories/31157
- http://secunia.com/advisories/31176
- http://secunia.com/advisories/31176
- http://secunia.com/advisories/31183
- http://secunia.com/advisories/31183
- http://secunia.com/advisories/31195
- http://secunia.com/advisories/31195
- http://secunia.com/advisories/31220
- http://secunia.com/advisories/31220
- http://secunia.com/advisories/31253
- http://secunia.com/advisories/31253
- http://secunia.com/advisories/31261
- http://secunia.com/advisories/31261
- http://secunia.com/advisories/31270
- http://secunia.com/advisories/31270
- http://secunia.com/advisories/31286
- http://secunia.com/advisories/31286
- http://secunia.com/advisories/31306
- http://secunia.com/advisories/31306
- http://secunia.com/advisories/31377
- http://secunia.com/advisories/31377
- http://secunia.com/advisories/31403
- http://secunia.com/advisories/31403
- http://secunia.com/advisories/33433
- http://secunia.com/advisories/33433
- http://secunia.com/advisories/34501
- http://secunia.com/advisories/34501
- http://security.gentoo.org/glsa/glsa-200808-03.xml
- http://security.gentoo.org/glsa/glsa-200808-03.xml
- http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.410484
- http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.410484
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0238
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0238
- http://www.debian.org/security/2008/dsa-1614
- http://www.debian.org/security/2008/dsa-1614
- http://www.debian.org/security/2008/dsa-1615
- http://www.debian.org/security/2008/dsa-1615
- http://www.debian.org/security/2008/dsa-1621
- http://www.debian.org/security/2008/dsa-1621
- http://www.debian.org/security/2009/dsa-1697
- http://www.debian.org/security/2009/dsa-1697
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:148
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:148
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:155
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:155
- http://www.mozilla.org/security/announce/2008/mfsa2008-34.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-34.html
- http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuilder-readme5031400
- http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuilder-readme5031400
- http://www.redhat.com/support/errata/RHSA-2008-0597.html
- http://www.redhat.com/support/errata/RHSA-2008-0597.html
- http://www.redhat.com/support/errata/RHSA-2008-0598.html
- http://www.redhat.com/support/errata/RHSA-2008-0598.html
- http://www.redhat.com/support/errata/RHSA-2008-0599.html
- http://www.redhat.com/support/errata/RHSA-2008-0599.html
- http://www.securityfocus.com/archive/1/494504/100/0/threaded
- http://www.securityfocus.com/archive/1/494504/100/0/threaded
- http://www.securityfocus.com/archive/1/494860/100/0/threaded
- http://www.securityfocus.com/archive/1/494860/100/0/threaded
- http://www.securityfocus.com/bid/29802
- http://www.securityfocus.com/bid/29802
- http://www.securitytracker.com/id?1020336
- http://www.securitytracker.com/id?1020336
- http://www.slackware.org/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.380767
- http://www.slackware.org/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.380767
- http://www.slackware.org/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.380974
- http://www.slackware.org/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.380974
- http://www.ubuntu.com/usn/usn-623-1
- http://www.ubuntu.com/usn/usn-623-1
- http://www.ubuntu.com/usn/usn-626-1
- http://www.ubuntu.com/usn/usn-626-1
- http://www.ubuntu.com/usn/usn-626-2
- http://www.ubuntu.com/usn/usn-626-2
- http://www.ubuntu.com/usn/usn-629-1
- http://www.ubuntu.com/usn/usn-629-1
- http://www.vupen.com/english/advisories/2008/1873
- http://www.vupen.com/english/advisories/2008/1873
- http://www.vupen.com/english/advisories/2009/0977
- http://www.vupen.com/english/advisories/2009/0977
- http://www.zerodayinitiative.com/advisories/ZDI-08-044/
- http://www.zerodayinitiative.com/advisories/ZDI-08-044/
- https://bugzilla.mozilla.org/show_bug.cgi?id=440230
- https://bugzilla.mozilla.org/show_bug.cgi?id=440230
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43167
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43167
- https://issues.rpath.com/browse/RPL-2683
- https://issues.rpath.com/browse/RPL-2683
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9900
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9900
- https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00125.html
- https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00125.html
- https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00144.html
- https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00144.html
- https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00667.html
- https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00667.html
- https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00672.html
- https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00672.html