Executive Summary
Summary | |
---|---|
Title | Sun Alert 102971 Multiple Memory Corruption Vulnerabilities in Mozilla 1.7 for Solaris 8, 9 and 10 |
Informations | |||
---|---|---|---|
Name | SUN-102971 | First vendor Publication | 2007-06-27 |
Vendor | Sun | Last vendor Modification | 2007-08-20 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Product: Mozilla v1.7, Solaris 9 Operating System, Solaris 10 Operating System, Solaris 8 Operating System A number of memory corruption vulnerabilities have been found in the Mozilla application which may allow a remote user who is able to create a web page which is visited by a local user using the Mozilla browser, or who sends a specially crafted email that is read by a local user using Mozilla, to either cause the Mozilla application to crash or execute arbitrary code via Javascript with the privileges of the user running Mozilla. The ability of a remote user to cause the Mozilla application to crash is a type of Denial of Service (DoS). The following Mozilla advisory describes nine separate memory corruption issues: This Sun Alert corresponds to the following five issues described in the Mozilla advisory above: FireMenuItemActiveEvent called at unsafe times (Boris Zbarsky): Potential string class buffer overruns in out-of-memory case (Darin Fisher, Daniel Veditz): Crashes involving table row and column groups (Jesse Ruderman, Martijn Wargers):
crypto.generateCRMFRequest callback can run on deleted context (shutdown): Note: Mozilla 1.7 is not affected by the below vulnerabilities mentioned in the advisory: Crashes referencing removed nodes (Jesse Ruderman, Martijn Wargers):
Additional references: Avoidance: Patch, Workaround State: Resolved First released: 26-Jun-2007 |
Original Source
Url : http://blogs.sun.com/security/entry/sun_alert_102971_multiple_memory |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:9934 | |||
Oval ID: | oval:org.mitre.oval:def:9934 | ||
Title: | Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) "anonymous box selectors outside of UA stylesheets," (5) stale references to "removed nodes," and (6) running the crypto.generateCRMFRequest callback on deleted context. | ||
Description: | Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) "anonymous box selectors outside of UA stylesheets," (5) stale references to "removed nodes," and (6) running the crypto.generateCRMFRequest callback on deleted context. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2006-3811 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 5 | |
Application | 4 | |
Application | 3 |
OpenVAS Exploits
Date | Description |
---|---|
2009-05-05 | Name : HP-UX Update for Thunderbird HPSBUX02156 File : nvt/gb_hp_ux_HPSBUX02156.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200608-02 (SeaMonkey) File : nvt/glsa_200608_02.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200608-03 (Firefox) File : nvt/glsa_200608_03.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200608-04 (Thunderbird) File : nvt/glsa_200608_04.nasl |
2008-09-04 | Name : FreeBSD Ports: firefox File : nvt/freebsd_firefox24.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1161-1 (mozilla-firefox) File : nvt/deb_1161_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1161-2 (mozilla-firefox) File : nvt/deb_1161_2.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
27577 | Mozilla Multiple Products Removed Node Reference Unspecified Code Execution |
27576 | Mozilla Multiple Products crypto.generateCRMFRequest Deleted Context Code Exe... |
27575 | Mozilla Multiple Products Anonymous Box Selector Unspecified Code Execution |
27574 | Mozilla Multiple Products Table Row/Column Group Unspecified Code Execution |
27573 | Mozilla Multiple Products String Class Out-of-memory Code Execution |
27572 | Mozilla Multiple Products nsListControlFrame::FireMenuItemActiveEvent Arbitra... |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2006-0735.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2006-0733.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_MozillaFirefox-1960.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-361-1.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-350-1.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-329-1.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-327-1.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_seamonkey-1952.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_MozillaThunderbird-1924.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_MozillaFirefox-1981.nasl - Type : ACT_GATHER_INFO |
2006-12-16 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2006-143.nasl - Type : ACT_GATHER_INFO |
2006-12-16 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2006-146.nasl - Type : ACT_GATHER_INFO |
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1161.nasl - Type : ACT_GATHER_INFO |
2006-08-30 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2006-0594.nasl - Type : ACT_GATHER_INFO |
2006-08-07 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2006-0608.nasl - Type : ACT_GATHER_INFO |
2006-08-07 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2006-0609.nasl - Type : ACT_GATHER_INFO |
2006-08-04 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200608-04.nasl - Type : ACT_GATHER_INFO |
2006-08-04 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2006-0610.nasl - Type : ACT_GATHER_INFO |
2006-08-04 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2006-0611.nasl - Type : ACT_GATHER_INFO |
2006-08-04 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2006-0609.nasl - Type : ACT_GATHER_INFO |
2006-08-04 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200608-02.nasl - Type : ACT_GATHER_INFO |
2006-08-04 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200608-03.nasl - Type : ACT_GATHER_INFO |
2006-07-29 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2006-0611.nasl - Type : ACT_GATHER_INFO |
2006-07-29 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2006-0610.nasl - Type : ACT_GATHER_INFO |
2006-07-28 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2006-0608.nasl - Type : ACT_GATHER_INFO |
2006-07-28 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_e2a926641d6011db88cf000c6ec775d9.nasl - Type : ACT_GATHER_INFO |
2006-07-27 | Name : A web browser on the remote host is prone to multiple flaws. File : seamonkey_103.nasl - Type : ACT_GATHER_INFO |
2006-07-27 | Name : The remote Windows host contains a mail client that is affected by multiple v... File : mozilla_thunderbird_1505.nasl - Type : ACT_GATHER_INFO |
2006-07-27 | Name : The remote Windows host contains a web browser that is affected by multiple v... File : mozilla_firefox_1505.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-04-26 18:14:35 |
|