Lucene search

K
nvd[email protected]NVD:CVE-2008-2785
HistoryJun 19, 2008 - 9:41 p.m.

CVE-2008-2785

2008-06-1921:41:00
CWE-189
web.nvd.nist.gov
5

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

AI Score

9

Confidence

High

EPSS

0.452

Percentile

97.4%

Mozilla Firefox before 2.0.0.16 and 3.x before 3.0.1, Thunderbird before 2.0.0.16, and SeaMonkey before 1.1.11 use an incorrect integer data type as a CSS object reference counter in the CSSValue array (aka nsCSSValue:Array) data structure, which allows remote attackers to execute arbitrary code via a large number of references to a common CSS object, leading to a counter overflow and a free of in-use memory, aka ZDI-CAN-349.

Affected configurations

Nvd
Node
mozillafirefoxRange2.0.0.15
OR
mozillafirefoxMatch2.0
OR
mozillafirefoxMatch2.0.0.1
OR
mozillafirefoxMatch2.0.0.2
OR
mozillafirefoxMatch2.0.0.3
OR
mozillafirefoxMatch2.0.0.4
OR
mozillafirefoxMatch2.0.0.5
OR
mozillafirefoxMatch2.0.0.6
OR
mozillafirefoxMatch2.0.0.7
OR
mozillafirefoxMatch2.0.0.8
OR
mozillafirefoxMatch2.0.0.9
OR
mozillafirefoxMatch2.0.0.10
OR
mozillafirefoxMatch2.0.0.11
OR
mozillafirefoxMatch2.0.0.12
OR
mozillafirefoxMatch2.0.0.13
OR
mozillafirefoxMatch2.0.0.14
OR
mozillafirefoxMatch3.0
OR
mozillaseamonkeyRange1.1.10
OR
mozillaseamonkeyMatch1.0
OR
mozillaseamonkeyMatch1.0alpha
OR
mozillaseamonkeyMatch1.0beta
OR
mozillaseamonkeyMatch1.0.1
OR
mozillaseamonkeyMatch1.0.2
OR
mozillaseamonkeyMatch1.0.3
OR
mozillaseamonkeyMatch1.0.4
OR
mozillaseamonkeyMatch1.0.5
OR
mozillaseamonkeyMatch1.0.6
OR
mozillaseamonkeyMatch1.0.7
OR
mozillaseamonkeyMatch1.0.8
OR
mozillaseamonkeyMatch1.0.9
OR
mozillaseamonkeyMatch1.1
OR
mozillaseamonkeyMatch1.1alpha
OR
mozillaseamonkeyMatch1.1beta
OR
mozillaseamonkeyMatch1.1.1
OR
mozillaseamonkeyMatch1.1.2
OR
mozillaseamonkeyMatch1.1.3
OR
mozillaseamonkeyMatch1.1.4
OR
mozillaseamonkeyMatch1.1.5
OR
mozillaseamonkeyMatch1.1.6
OR
mozillaseamonkeyMatch1.1.7
OR
mozillaseamonkeyMatch1.1.8
OR
mozillaseamonkeyMatch1.1.9
OR
mozillathunderbirdRange2.0.0.14
OR
mozillathunderbirdMatch0.1
OR
mozillathunderbirdMatch0.2
OR
mozillathunderbirdMatch0.3
OR
mozillathunderbirdMatch0.4
OR
mozillathunderbirdMatch0.5
OR
mozillathunderbirdMatch0.6
OR
mozillathunderbirdMatch0.7
OR
mozillathunderbirdMatch0.8
OR
mozillathunderbirdMatch0.9
OR
mozillathunderbirdMatch1.0
OR
mozillathunderbirdMatch1.0.2
OR
mozillathunderbirdMatch1.0.5
OR
mozillathunderbirdMatch1.0.6
OR
mozillathunderbirdMatch1.0.7
OR
mozillathunderbirdMatch1.0.8
OR
mozillathunderbirdMatch1.5
OR
mozillathunderbirdMatch1.5.0.2
OR
mozillathunderbirdMatch1.5.0.4
OR
mozillathunderbirdMatch1.5.0.5
OR
mozillathunderbirdMatch1.5.0.7
OR
mozillathunderbirdMatch1.5.0.8
OR
mozillathunderbirdMatch1.5.0.9
OR
mozillathunderbirdMatch1.5.0.10
OR
mozillathunderbirdMatch1.5.0.12
OR
mozillathunderbirdMatch1.5.0.13
OR
mozillathunderbirdMatch1.5.0.14
OR
mozillathunderbirdMatch2.0.0.0
OR
mozillathunderbirdMatch2.0.0.4
OR
mozillathunderbirdMatch2.0.0.5
OR
mozillathunderbirdMatch2.0.0.6
OR
mozillathunderbirdMatch2.0.0.9
OR
mozillathunderbirdMatch2.0.0.12

References

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

AI Score

9

Confidence

High

EPSS

0.452

Percentile

97.4%