Lucene search

K
certCERTVU:761756
HistoryFeb 26, 2007 - 12:00 a.m.

Mozilla layout engine contains multiple vulnerabilities

2007-02-2600:00:00
www.kb.cert.org
11

3.7 Low

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

0.971 High

EPSS

Percentile

99.8%

Overview

The Mozilla layout engine contains multiple memory corruption vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code, or create a denial of service condition.

Description

The Mozilla Foundation supports several Open Source projects, including the Mozilla, Seamonkey, and Firefox web browsers. The Thunderbird email client is also a Mozilla product. These products use the Mozilla layout engine to render HTML formatted text.

The Mozilla layout engine contains multiple vulnerabilities. An attacker may be able to exploit these vulnerabilties by convincing a user to connect to a specially crafted website or viewing an HTML formatted email. For more information refer to Mozilla Foundation Security Advisory 2007-01.


Impact

A remote, unauthenticated attacker may be able to execute arbitrary code or create a denial of service condition.


Solution

Upgrade
See Mozilla Foundation Security Advisory 2007-01 for information about affected clients.


View email in plain text

Configuring Thunderbird to display email in plain text may partially mitigate this vulnerability.


Vendor Information

761756

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Mozilla __ Affected

Updated: February 26, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

See <http://www.mozilla.org/security/announce/2007/mfsa2007-01.html&gt; for more details.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23761756 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Mozilla credits Jesse Ruderman, Martijn Wargers and Olli Pettay for reporting this vulnerability.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2007-0775
Severity Metric: 2.84 Date Public:

3.7 Low

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

0.971 High

EPSS

Percentile

99.8%