Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2011-2984 | First vendor Publication | 2011-08-18 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Mozilla Firefox before 3.6.20, SeaMonkey 2.x, Thunderbird 3.x before 3.1.12, and possibly other products does not properly handle the dropping of a tab element, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by establishing a content area and registering for drop events. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2984 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:14358 | |||
Oval ID: | oval:org.mitre.oval:def:14358 | ||
Title: | Mozilla Firefox before 3.6.20, SeaMonkey 2.x, Thunderbird 3.x before 3.1.12, and possibly other products does not properly handle the dropping of a tab element, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by establishing a content area and registering for drop events. | ||
Description: | Mozilla Firefox before 3.6.20, SeaMonkey 2.x, Thunderbird 3.x before 3.1.12, and possibly other products does not properly handle the dropping of a tab element, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by establishing a content area and registering for drop events. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2011-2984 | Version: | 16 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows XP Microsoft Windows 2000 | Product(s): | Mozilla Seamonkey Mozilla Firefox |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:14861 | |||
Oval ID: | oval:org.mitre.oval:def:14861 | ||
Title: | DSA-2296-1 iceweasel -- several | ||
Description: | Several vulnerabilities have been discovered in Iceweasel, a web browser based on Firefox. The included XULRunner library provides rendering services for several other applications included in Debian. CVE-2011-0084 "regenrecht" discovered that incorrect pointer handling in the SVG processing code could lead to the execution of arbitrary code. CVE-2011-2378 "regenrecht" discovered that incorrect memory management in DOM processing could lead to the execution of arbitrary code. CVE-2011-2981 "moz_bug_r_a_4" discovered a Chrome privilege escalation vulnerability in the event handler code. CVE-2011-2982 Gary Kwong, Igor Bukanov, Nils and Bob Clary discovered memory corruption bugs, which may lead to the execution of arbitrary code. CVE-2011-2983 "shutdown" discovered an information leak in the handling of RegExp.input. CVE-2011-2984 "moz_bug_r_a4" discovered a Chrome privilege escalation vulnerability. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2296-1 CVE-2011-0084 CVE-2011-2378 CVE-2011-2981 CVE-2011-2982 CVE-2011-2983 CVE-2011-2984 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | iceweasel |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:14961 | |||
Oval ID: | oval:org.mitre.oval:def:14961 | ||
Title: | DSA-2295-1 iceape -- several | ||
Description: | Several vulnerabilities have been found in the Iceape internet suite, an unbranded version of Seamonkey: CVE-2011-0084 "regenrecht" discovered that incorrect pointer handling in the SVG processing code could lead to the execution of arbitrary code. CVE-2011-2378 "regenrecht" discovered that incorrect memory management in DOM processing could lead to the execution of arbitrary code. CVE-2011-2981 "moz_bug_r_a_4" discovered a Chrome privilege escalation vulnerability in the event handler code. CVE-2011-2982 Gary Kwong, Igor Bukanov, Nils and Bob Clary discovered memory corruption bugs, which may lead to the execution of arbitrary code. CVE-2011-2983 "shutdown" discovered an information leak in the handling of RegExp.input. CVE-2011-2984 "moz_bug_r_a4" discovered a Chrome privilege escalation vulnerability. The oldstable distribution is not affected. The iceape package only provides the XPCOM code. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2295-1 CVE-2011-0084 CVE-2011-2378 CVE-2011-2981 CVE-2011-2982 CVE-2011-2983 CVE-2011-2984 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | iceape |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:15093 | |||
Oval ID: | oval:org.mitre.oval:def:15093 | ||
Title: | DSA-2297-1 icedove -- several | ||
Description: | Several vulnerabilities have been discovered in Icedove, an unbranded version of the Thunderbird mail/news client. CVE-2011-0084 "regenrecht" discovered that incorrect pointer handling in the SVG processing code could lead to the execution of arbitrary code. CVE-2011-2378 "regenrecht" discovered that incorrect memory management in DOM processing could lead to the execution of arbitrary code. CVE-2011-2981 "moz_bug_r_a_4" discovered a Chrome privilege escalation vulnerability in the event handler code. CVE-2011-2982 Gary Kwong, Igor Bukanov, Nils and Bob Clary discovered memory corruption bugs, which may lead to the execution of arbitrary code. CVE-2011-2983 "shutdown" discovered an information leak in the handling of RegExp.input. CVE-2011-2984 "moz_bug_r_a4" discovered a Chrome privilege escalation vulnerability. As indicated in the Lenny release notes, security support for the Icedove packages in the oldstable needed to be stopped before the end of the regular Lenny security maintenance life cycle. You are strongly encouraged to upgrade to stable or switch to a different mail client. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2297-1 CVE-2011-0084 CVE-2011-2378 CVE-2011-2981 CVE-2011-2982 CVE-2011-2983 CVE-2011-2984 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | icedove |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:21884 | |||
Oval ID: | oval:org.mitre.oval:def:21884 | ||
Title: | RHSA-2011:1164: firefox security update (Critical) | ||
Description: | Mozilla Firefox before 3.6.20, SeaMonkey 2.x, Thunderbird 3.x before 3.1.12, and possibly other products does not properly handle the dropping of a tab element, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by establishing a content area and registering for drop events. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2011:1164-01 CESA-2011:1164 CVE-2011-0084 CVE-2011-2378 CVE-2011-2981 CVE-2011-2982 CVE-2011-2983 CVE-2011-2984 | Version: | 81 |
Platform(s): | Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 CentOS Linux 5 CentOS Linux 6 | Product(s): | firefox xulrunner |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23256 | |||
Oval ID: | oval:org.mitre.oval:def:23256 | ||
Title: | DEPRECATED: ELSA-2011:1164: firefox security update (Critical) | ||
Description: | Mozilla Firefox before 3.6.20, SeaMonkey 2.x, Thunderbird 3.x before 3.1.12, and possibly other products does not properly handle the dropping of a tab element, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by establishing a content area and registering for drop events. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:1164-01 CVE-2011-0084 CVE-2011-2378 CVE-2011-2981 CVE-2011-2982 CVE-2011-2983 CVE-2011-2984 | Version: | 30 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | firefox xulrunner |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23686 | |||
Oval ID: | oval:org.mitre.oval:def:23686 | ||
Title: | ELSA-2011:1164: firefox security update (Critical) | ||
Description: | Mozilla Firefox before 3.6.20, SeaMonkey 2.x, Thunderbird 3.x before 3.1.12, and possibly other products does not properly handle the dropping of a tab element, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by establishing a content area and registering for drop events. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:1164-01 CVE-2011-0084 CVE-2011-2378 CVE-2011-2981 CVE-2011-2982 CVE-2011-2983 CVE-2011-2984 | Version: | 29 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | firefox xulrunner |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-07-30 | Name : CentOS Update for firefox CESA-2011:1164 centos4 x86_64 File : nvt/gb_CESA-2011_1164_firefox_centos4_x86_64.nasl |
2012-07-30 | Name : CentOS Update for firefox CESA-2011:1164 centos5 x86_64 File : nvt/gb_CESA-2011_1164_firefox_centos5_x86_64.nasl |
2012-07-30 | Name : CentOS Update for xulrunner CESA-2011:1164 centos5 x86_64 File : nvt/gb_CESA-2011_1164_xulrunner_centos5_x86_64.nasl |
2011-09-23 | Name : CentOS Update for firefox CESA-2011:1164 centos5 i386 File : nvt/gb_CESA-2011_1164_firefox_centos5_i386.nasl |
2011-09-23 | Name : CentOS Update for xulrunner CESA-2011:1164 centos5 i386 File : nvt/gb_CESA-2011_1164_xulrunner_centos5_i386.nasl |
2011-09-21 | Name : Debian Security Advisory DSA 2295-1 (iceape) File : nvt/deb_2295_1.nasl |
2011-09-21 | Name : Debian Security Advisory DSA 2296-1 (iceweasel) File : nvt/deb_2296_1.nasl |
2011-09-21 | Name : Debian Security Advisory DSA 2297-1 (icedove) File : nvt/deb_2297_1.nasl |
2011-09-21 | Name : FreeBSD Ports: firefox File : nvt/freebsd_firefox58.nasl |
2011-09-09 | Name : Mozilla Products Multiple Vulnerabilities (Windows) File : nvt/gb_mozilla_prdts_mult_vuln_sep11_win.nasl |
2011-09-07 | Name : SuSE Update for MozillaFirefox,MozillaThunderbird,seamonkey SUSE-SA:2011:037 File : nvt/gb_suse_2011_037.nasl |
2011-08-27 | Name : Ubuntu Update for thunderbird USN-1185-1 File : nvt/gb_ubuntu_USN_1185_1.nasl |
2011-08-24 | Name : Ubuntu Update for firefox USN-1184-1 File : nvt/gb_ubuntu_USN_1184_1.nasl |
2011-08-19 | Name : CentOS Update for firefox CESA-2011:1164 centos4 i386 File : nvt/gb_CESA-2011_1164_firefox_centos4_i386.nasl |
2011-08-19 | Name : RedHat Update for firefox RHSA-2011:1164-01 File : nvt/gb_RHSA-2011_1164-01_firefox.nasl |
2011-08-19 | Name : Mandriva Update for mozilla MDVSA-2011:127 (mozilla) File : nvt/gb_mandriva_MDVSA_2011_127.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
74587 | Mozilla Multiple Products Tab Element Dropping Weakness Remote Code Execution |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_mozilla-js192-110817.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_MozillaThunderbird-110826.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_MozillaThunderbird-110826.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_MozillaFirefox-110817.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-1164.nasl - Type : ACT_GATHER_INFO |
2013-01-08 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201301-01.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20110816_firefox_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_MozillaFirefox-7713.nasl - Type : ACT_GATHER_INFO |
2011-08-30 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_MozillaFirefox-110824.nasl - Type : ACT_GATHER_INFO |
2011-08-30 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_MozillaFirefox-7712.nasl - Type : ACT_GATHER_INFO |
2011-08-26 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1185-1.nasl - Type : ACT_GATHER_INFO |
2011-08-23 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2297.nasl - Type : ACT_GATHER_INFO |
2011-08-20 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1184-1.nasl - Type : ACT_GATHER_INFO |
2011-08-18 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2295.nasl - Type : ACT_GATHER_INFO |
2011-08-18 | Name : The remote Windows host contains a web browser that is affected by multiple v... File : mozilla_firefox_3620.nasl - Type : ACT_GATHER_INFO |
2011-08-18 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2011-127.nasl - Type : ACT_GATHER_INFO |
2011-08-18 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2296.nasl - Type : ACT_GATHER_INFO |
2011-08-17 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-1164.nasl - Type : ACT_GATHER_INFO |
2011-08-17 | Name : The remote Windows host contains a mail client may be affected by multiple vu... File : mozilla_thunderbird_3112.nasl - Type : ACT_GATHER_INFO |
2011-08-17 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_834591a9c82f11e0897d6c626dd55a41.nasl - Type : ACT_GATHER_INFO |
2011-08-17 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2011-1164.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:04:24 |
|
2024-11-28 12:26:35 |
|
2024-11-01 01:17:13 |
|
2024-10-22 12:17:07 |
|
2024-08-02 12:17:12 |
|
2024-08-02 01:04:58 |
|
2024-02-10 01:15:31 |
|
2024-02-02 01:16:43 |
|
2024-02-01 12:04:50 |
|
2023-09-05 12:15:40 |
|
2023-09-05 01:04:42 |
|
2023-09-02 12:15:45 |
|
2023-09-02 01:04:47 |
|
2023-08-12 12:19:01 |
|
2023-08-12 01:04:48 |
|
2023-08-11 12:15:51 |
|
2023-08-11 01:04:56 |
|
2023-08-06 12:15:13 |
|
2023-08-06 01:04:48 |
|
2023-08-04 12:15:17 |
|
2023-08-04 01:04:49 |
|
2023-07-14 12:15:17 |
|
2023-07-14 01:04:46 |
|
2023-04-01 01:12:52 |
|
2023-03-29 01:17:10 |
|
2023-03-28 12:04:53 |
|
2022-10-11 12:13:37 |
|
2022-10-11 01:04:32 |
|
2021-05-04 12:14:54 |
|
2021-04-22 01:16:13 |
|
2020-10-14 01:06:49 |
|
2020-10-03 01:06:50 |
|
2020-05-29 01:06:18 |
|
2020-05-23 01:45:34 |
|
2020-05-23 00:29:53 |
|
2019-06-25 12:03:56 |
|
2018-01-18 12:04:12 |
|
2017-11-22 12:04:10 |
|
2017-09-19 09:24:41 |
|
2016-06-28 18:45:41 |
|
2016-04-26 20:56:56 |
|
2014-06-14 13:31:13 |
|
2014-02-17 11:04:14 |
|
2013-05-10 23:04:55 |
|