Lucene search

K
certCERTVU:269484
HistoryFeb 23, 2007 - 12:00 a.m.

Mozilla JavaScript engine vulnerable to memory corruption

2007-02-2300:00:00
www.kb.cert.org
23

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.967 High

EPSS

Percentile

99.6%

Overview

The Mozilla JavaScript engine contains multiple memory corruption vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code, or create a denial of service condition.

Description

The Mozilla Foundation supports several Open Source projects, including the Mozilla, Seamonkey, and Firefox web browsers. The Thunderbird email client is also a Mozilla product.

Multiple memory corruption vulnerabilities exist in the way Mozilla products process JavaScript. For more information refer to Mozilla Foundation Security Advisory 2007-01.

Note that other Mozilla-based applications may also be affected.


Impact

A remote, unauthenticated attacker may be able to execute arbitrary code or create a denial of service condition.


Solution

Upgrade
See Mozilla Foundation Security Advisory 2007-01 for information about affected clients.


Disable Javascript

Disabling JavaScript may mitigate this vulnerability. See the Securing Your Web Browser document for more information.


Vendor Information

269484

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Mozilla __ Affected

Updated: February 23, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

See <http://www.mozilla.org/security/announce/2007/mfsa2007-01.html&gt; for more details.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23269484 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Mozilla for information used in this report. Mozilla thanks Brian Crowder, Igor Bukanov, Johnny Stenback, moz_bug_r_a4 and shutdown.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2007-0777
Severity Metric: 2.65 Date Public:

References

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.967 High

EPSS

Percentile

99.6%