Mozilla JavaScript engine vulnerable to memory corruption

2007-02-23T00:00:00
ID VU:269484
Type cert
Reporter CERT
Modified 2007-03-08T14:54:00

Description

Overview

The Mozilla JavaScript engine contains multiple memory corruption vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code, or create a denial of service condition.

Description

The Mozilla Foundation supports several Open Source projects, including the Mozilla, Seamonkey, and Firefox web browsers. The Thunderbird email client is also a Mozilla product.

Multiple memory corruption vulnerabilities exist in the way Mozilla products process JavaScript. For more information refer to Mozilla Foundation Security Advisory 2007-01.

Note that other Mozilla-based applications may also be affected.


Impact

A remote, unauthenticated attacker may be able to execute arbitrary code or create a denial of service condition.


Solution

Upgrade
See Mozilla Foundation Security Advisory 2007-01 for information about affected clients.


Disable Javascript

Disabling JavaScript may mitigate this vulnerability. See the Securing Your Web Browser document for more information.


Vendor Information

269484

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Mozilla __ Affected

Updated: February 23, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

See <http://www.mozilla.org/security/announce/2007/mfsa2007-01.html> for more details.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group | Score | Vector
---|---|---
Base | |
Temporal | |
Environmental | |

References

  • <http://www.mozilla.org/security/announce/2007/mfsa2007-01.html>
  • <http://www.mozilla.org/products/mozilla1.x/>
  • <http://www.mozilla.com/en-US/>
  • <http://www.mozilla.com/en-US/thunderbird/>
  • <http://www.mozilla.org/security/announce/2007/mfsa2007-01.html>
  • <http://www.cert.org/tech_tips/securing_browser/>
  • <http://secunia.com/advisories/24238/>
  • <http://secunia.com/advisories/24287/>
  • <http://secunia.com/advisories/24252/>
  • <http://secunia.com/advisories/24320/>
  • <http://secunia.com/advisories/24328/>
  • <http://secunia.com/advisories/24293/>
  • <http://secunia.com/advisories/24327/>
  • <http://secunia.com/advisories/24343/>
  • <http://secunia.com/advisories/24333/>
  • <http://secunia.com/advisories/24393/>
  • <http://secunia.com/advisories/24352/>
  • <http://www.ciac.org/ciac/bulletins/r-164.shtml>
  • <http://secunia.com/advisories/24406/>
  • <http://secunia.com/advisories/24432/>
  • <http://secunia.com/advisories/24410/>
  • <http://secunia.com/advisories/24389/>
  • <http://secunia.com/advisories/24455/>
  • <http://secunia.com/advisories/24456/>
  • <http://secunia.com/advisories/24457/>

Acknowledgements

Thanks to Mozilla for information used in this report. Mozilla thanks Brian Crowder, Igor Bukanov, Johnny Stenback, moz_bug_r_a4 and shutdown.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: | CVE-2007-0777
---|---
Severity Metric: | 2.65
Date Public: | 2007-02-23
Date First Published: | 2007-02-23
Date Last Updated: | 2007-03-08 14:54 UTC
Document Revision: | 55