Mozilla products vulnerable to memory corruption in the JavaScript engine

ID VU:609956
Type cert
Reporter CERT
Modified 2007-06-20T00:00:00



A vulnerability in the Mozilla JavaScript engine may allow execution of arbitrary code or denial of service.


The Mozilla JavaScript engine contains an unspecified vulnerability that may result in memory corruption. The impact of this memory corruption is unclear. According to Mozilla Foundation Security Advisory 2007-12:

Some of these crashes that showed evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code.
Information about the individual bug reports addressed in this update can be found in Mozilla Foundation Security Advisory 2007-12.


Potential consequences include remote execution of arbitrary code and denial of service.


These vulnerabilities are addressed in Firefox, Firefox, Thunderbird, Thunderbird, SeaMonkey 1.0.9, SeaMonkey 1.1.2.

Users that are unable to update should consider the following workaround:

Disable JavaScript

For instructions on how to disable JavaScript in Firefox, please refer to the Firefox section of the Securing Your Web Browser document.

Systems Affected

Vendor| Status| Date Notified| Date Updated
Mozilla| | -| 31 May 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics

Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A


  • <>
  • <>
  • <>
  • <>
  • <>
  • <>
  • <>
  • <>
  • <>
  • <>
  • <>
  • <>


These vulnerabilities were reported in Mozilla Foundation Security Advisory 2007-12 . Mozilla credits Brendan Eich, Igor Bukanov, Jesse Ruderman, moz_bug_r_a4 and Wladimir Palant with reporting these issues.

This document was written by Chris Taschner.

Other Information

  • CVE IDs: CVE-2007-2868
  • Date Public: 31 May 2007
  • Date First Published: 31 May 2007
  • Date Last Updated: 20 Jun 2007
  • Severity Metric: 8.19
  • Document Revision: 35