CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
97.4%
The block reflow implementation in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an image whose display requires more pixels than nscoord_MAX, related to nsBlockFrame::DrainOverflowLines.
Vendor | Product | Version | CPE |
---|---|---|---|
mozilla | firefox | * | cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* |
mozilla | firefox | 2.0 | cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:* |
mozilla | firefox | 2.0.0.1 | cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:* |
mozilla | firefox | 2.0.0.2 | cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:* |
mozilla | firefox | 2.0.0.3 | cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:* |
mozilla | firefox | 2.0.0.4 | cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:* |
mozilla | firefox | 2.0.0.5 | cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:* |
mozilla | firefox | 2.0.0.6 | cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:* |
mozilla | firefox | 2.0.0.7 | cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:* |
mozilla | firefox | 2.0.0.8 | cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:* |
lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html
rhn.redhat.com/errata/RHSA-2008-0616.html
secunia.com/advisories/30878
secunia.com/advisories/30898
secunia.com/advisories/30903
secunia.com/advisories/30911
secunia.com/advisories/30915
secunia.com/advisories/30949
secunia.com/advisories/31005
secunia.com/advisories/31008
secunia.com/advisories/31021
secunia.com/advisories/31023
secunia.com/advisories/31069
secunia.com/advisories/31076
secunia.com/advisories/31183
secunia.com/advisories/31195
secunia.com/advisories/31220
secunia.com/advisories/31253
secunia.com/advisories/31286
secunia.com/advisories/31377
secunia.com/advisories/31403
secunia.com/advisories/33433
secunia.com/advisories/34501
security.gentoo.org/glsa/glsa-200808-03.xml
slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152
slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.384911
slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.410484
sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
wiki.rpath.com/Advisories:rPSA-2008-0216
www.debian.org/security/2008/dsa-1607
www.debian.org/security/2008/dsa-1615
www.debian.org/security/2008/dsa-1621
www.debian.org/security/2009/dsa-1697
www.kb.cert.org/vuls/id/607267
www.mandriva.com/security/advisories?name=MDVSA-2008:136
www.mandriva.com/security/advisories?name=MDVSA-2008:155
www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15
www.mozilla.org/security/announce/2008/mfsa2008-33.html
www.redhat.com/support/errata/RHSA-2008-0547.html
www.redhat.com/support/errata/RHSA-2008-0549.html
www.redhat.com/support/errata/RHSA-2008-0569.html
www.securityfocus.com/archive/1/494080/100/0/threaded
www.securityfocus.com/bid/30038
www.securitytracker.com/id?1020419
www.ubuntu.com/usn/usn-619-1
www.ubuntu.com/usn/usn-629-1
www.vupen.com/english/advisories/2008/1993/references
www.vupen.com/english/advisories/2009/0977
bugzilla.mozilla.org/show_bug.cgi?id=439735
issues.rpath.com/browse/RPL-2646
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9865
www.redhat.com/archives/fedora-package-announce/2008-August/msg00125.html
www.redhat.com/archives/fedora-package-announce/2008-August/msg00144.html
www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html
www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html
www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html