ID ELSA-2008-0547 Type oraclelinux Reporter Oracle Modified 2008-07-02T00:00:00
Description
[1.0.9-16.3.0.1.el4_6]
- Added mozilla-oracle-default-prefs.js, mozilla-oracle-default-bookmarks.html,
and mozilla-home-page.patch
[1.0.9-16.3.el4]
- Ensure the correct headers are exported
[1.0.9-16.2.el4]
- Respun for mozilla bugs #439035,#439735,#440308
[1.0.9-16.1.el4]
- Update patchset to fix regression as per 1.8.1.15
{"result": {"cve": [{"id": "CVE-2008-2801", "type": "cve", "title": "CVE-2008-2801", "description": "Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly implement JAR signing, which allows remote attackers to execute arbitrary code via (1) injection of JavaScript into documents within a JAR archive or (2) a JAR archive that uses relative URLs to JavaScript files.", "published": "2008-07-07T19:41:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2801", "cvelist": ["CVE-2008-2801"], "lastseen": "2017-09-29T14:25:56"}, {"id": "CVE-2008-2799", "type": "cve", "title": "CVE-2008-2799", "description": "Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unknown vectors related to the JavaScript engine.", "published": "2008-07-07T19:41:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2799", "cvelist": ["CVE-2008-2799"], "lastseen": "2017-09-29T14:25:56"}, {"id": "CVE-2008-2803", "type": "cve", "title": "CVE-2008-2803", "description": "The mozIJSSubScriptLoader.LoadScript function in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 does not apply XPCNativeWrappers to scripts loaded from (1) file: URIs, (2) data: URIs, or (3) certain non-canonical chrome: URIs, which allows remote attackers to execute arbitrary code via vectors involving third-party add-ons.", "published": "2008-07-07T19:41:00", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2803", "cvelist": ["CVE-2008-2803"], "lastseen": "2017-09-29T14:25:56"}, {"id": "CVE-2008-2807", "type": "cve", "title": "CVE-2008-2807", "description": "Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly handle an invalid .properties file for an add-on, which allows remote attackers to read uninitialized memory, as demonstrated by use of ISO 8859 encoding instead of UTF-8 encoding in a French .properties file.", "published": "2008-07-07T19:41:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2807", "cvelist": ["CVE-2008-2807"], "lastseen": "2017-09-29T14:25:56"}, {"id": "CVE-2008-2810", "type": "cve", "title": "CVE-2008-2810", "description": "Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly identify the context of Windows shortcut files, which allows user-assisted remote attackers to bypass the Same Origin Policy via a crafted web site for which the user has previously saved a shortcut.", "published": "2008-07-07T19:41:00", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2810", "cvelist": ["CVE-2008-2810"], "lastseen": "2017-09-29T14:25:56"}, {"id": "CVE-2008-2805", "type": "cve", "title": "CVE-2008-2805", "description": "Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 allow remote attackers to force the upload of arbitrary local files from a client computer via vectors involving originalTarget and DOM Range.", "published": "2008-07-07T19:41:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2805", "cvelist": ["CVE-2008-2805"], "lastseen": "2017-09-29T14:25:56"}, {"id": "CVE-2008-2808", "type": "cve", "title": "CVE-2008-2808", "description": "Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly escape HTML in file:// URLs in directory listings, which allows remote attackers to conduct cross-site scripting (XSS) attacks or have unspecified other impact via a crafted filename.", "published": "2008-07-07T19:41:00", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2808", "cvelist": ["CVE-2008-2808"], "lastseen": "2017-09-29T14:25:56"}, {"id": "CVE-2008-2800", "type": "cve", "title": "CVE-2008-2800", "description": "Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 allow remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via vectors involving (1) an event handler attached to an outer window, (2) a SCRIPT element in an unloaded document, or (3) the onreadystatechange handler in conjunction with an XMLHttpRequest.", "published": "2008-07-07T19:41:00", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2800", "cvelist": ["CVE-2008-2800"], "lastseen": "2017-09-29T14:25:56"}, {"id": "CVE-2008-2802", "type": "cve", "title": "CVE-2008-2802", "description": "Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to execute arbitrary code via an XUL document that includes a script from a chrome: URI that points to a fastload file, related to this file's \"privilege level.\"", "published": "2008-07-07T19:41:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2802", "cvelist": ["CVE-2008-2802"], "lastseen": "2017-09-29T14:25:56"}, {"id": "CVE-2008-2809", "type": "cve", "title": "CVE-2008-2809", "description": "Mozilla 1.9 M8 and earlier, Mozilla Firefox 2 before 2.0.0.15, SeaMonkey 1.1.5 and other versions before 1.1.10, Netscape 9.0, and other Mozilla-based web browsers, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regard the certificate as also accepted for all domain names in subjectAltName:dNSName fields, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.", "published": "2008-07-08T19:41:00", "cvss": {"score": 4.0, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2809", "cvelist": ["CVE-2008-2809"], "lastseen": "2017-09-29T14:25:56"}], "openvas": [{"id": "OPENVAS:1361412562310800013", "type": "openvas", "title": "Mozilla Seamonkey Multiple Vulnerability July-08 (Windows)", "description": "The host is installed with Mozilla Seamonkey, that is prone to\n multiple vulnerabilities.", "published": "2008-10-06T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310800013", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798", "CVE-2008-2806"], "lastseen": "2018-04-06T11:16:04"}, {"id": "OPENVAS:1361412562310800020", "type": "openvas", "title": "Mozilla Firefox Multiple Vulnerability July-08 (Linux)", "description": "The host is installed with Mozilla Firefox browser, that is prone\n to multiple vulnerabilities.", "published": "2008-10-07T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310800020", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798", "CVE-2008-2806"], "lastseen": "2018-04-06T11:16:16"}, {"id": "OPENVAS:1361412562310880194", "type": "openvas", "title": "CentOS Update for firefox CESA-2008:0549 centos3 x86_64", "description": "Check for the Version of firefox", "published": "2009-02-27T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880194", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2018-04-09T11:40:20"}, {"id": "OPENVAS:1361412562310870117", "type": "openvas", "title": "RedHat Update for firefox RHSA-2008:0569-01", "description": "Check for the Version of firefox", "published": "2009-03-06T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870117", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2018-04-09T11:40:38"}, {"id": "OPENVAS:1361412562310880098", "type": "openvas", "title": "CentOS Update for seamonkey CESA-2008:0547 centos4 i386", "description": "Check for the Version of seamonkey", "published": "2009-02-27T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880098", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2018-04-09T11:38:31"}, {"id": "OPENVAS:860179", "type": "openvas", "title": "Fedora Update for seamonkey FEDORA-2008-6196", "description": "Check for the Version of seamonkey", "published": "2009-02-17T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=860179", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2017-07-25T10:56:26"}, {"id": "OPENVAS:860779", "type": "openvas", "title": "Fedora Update for Miro FEDORA-2008-6127", "description": "Check for the Version of Miro", "published": "2009-02-17T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=860779", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2017-07-25T10:56:31"}, {"id": "OPENVAS:61366", "type": "openvas", "title": "Debian Security Advisory DSA 1615-1 (xulrunner)", "description": "The remote host is missing an update to xulrunner\nannounced via advisory DSA 1615-1.", "published": "2008-08-15T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=61366", "cvelist": ["CVE-2008-2933", "CVE-2008-2801", "CVE-2008-2785", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2017-07-24T12:49:51"}, {"id": "OPENVAS:880039", "type": "openvas", "title": "CentOS Update for seamonkey CESA-2008:0547 centos3 x86_64", "description": "Check for the Version of seamonkey", "published": "2009-02-27T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=880039", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2017-07-25T10:57:11"}, {"id": "OPENVAS:860805", "type": "openvas", "title": "Fedora Update for galeon FEDORA-2008-6127", "description": "Check for the Version of galeon", "published": "2009-02-17T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=860805", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2017-07-25T10:56:58"}], "seebug": [{"id": "SSV:3533", "type": "seebug", "title": "Mozilla Firefox 2.0.0.14\u5b58\u5728\u591a\u4e2a\u8fdc\u7a0b\u6f0f\u6d1e", "description": "BUGTRAQ ID: 30038\r\nCVE ID\uff1aCVE-2008-2798\r\n CVE-2008-2799\r\n CVE-2008-2800\r\n CVE-2008-2801\r\n CVE-2008-2802\r\n CVE-2008-2803\r\n CVE-2008-2805\r\n CVE-2008-2806\r\n CVE-2008-2807\r\n CVE-2008-2808\r\n CVE-2008-2809\r\n CVE-2008-2810\r\n CVE-2008-2811\r\nCNCVE ID\uff1aCNCVE-20082798\r\n CNCVE-20082799\r\n CNCVE-20082800\r\n CNCVE-20082801\r\n CNCVE-20082802\r\n CNCVE-20082803\r\n CNCVE-20082805\r\n CNCVE-20082806\r\n CNCVE-20082807\r\n CNCVE-20082808\r\n CNCVE-20082809\r\n CNCVE-20082810\r\n CNCVE-20082811\r\n\r\nMozilla Firefox\u662f\u4e00\u6b3e\u5f00\u653e\u6e90\u4ee3\u7801\u7684WEB\u6d4f\u89c8\u5668\u3002\r\nMozilla Firefox\u5b58\u5728\u9519\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u83b7\u5f97\u654f\u611f\u4fe1\u606f\u6216\u8fdb\u884c\u62d2\u7edd\u670d\u52a1\uff0c\u4efb\u610f\u4ee3\u7801\u6267\u884c\u653b\u51fb\u3002\r\n-\u5904\u7406\u7578\u5f62JavaScript\u5185\u5bb9\u5b58\u5728\u7f3a\u9677\uff0c\u53ef\u5bfc\u81f4Firefox\u5d29\u6e83\uff0c\u53ef\u80fd\u5bfc\u81f4\u4efb\u610f\u4ee3\u7801\u6267\u884c(CVE-2008-2801, CVE-2008-2802, CVE-2008-2803)\u3002\r\n-\u5904\u7406\u7578\u5f62WEB\u5185\u5bb9\u9875\u5b58\u5728\u7f3a\u9677\uff0c\u53ef\u5bfc\u81f4Firefox\u5d29\u6e83\uff0c\u53ef\u80fd\u5bfc\u81f4\u4efb\u610f\u4ee3\u7801\u6267\u884c(CVE-2008-2798, CVE-2008-2799, CVE-2008-2811)\u3002\r\n-\u7279\u6b8a\u6784\u5efa\u5305\u542b\u7279\u6b8a\u5185\u5bb9\u7684WEB\u9875\u8bf1\u4f7fFirefox\u7528\u6237\u5904\u7406\u53ef\u5bfc\u81f4\u654f\u611f\u4fe1\u606f\u6cc4\u6f0f(CVE-2008-2800)\u3002\r\n-Firefox\u5b58\u5728\u4e24\u4e2a\u672c\u5730\u6587\u4ef6\u6cc4\u6f0f\u95ee\u9898\uff0c\u5305\u542b\u6076\u610f\u5185\u5bb9\u7684WEB\u9875\u53ef\u6cc4\u6f0f\u672c\u5730\u6587\u4ef6\u5185\u5bb9(CVE-2008-2805, CVE-2008-2810)\u3002\r\n-\u5904\u7406\u7578\u5f62.properties\u6587\u4ef6\u5b58\u5728\u7f3a\u9677\uff0c\u6076\u610f\u6269\u5c55\u4f1a\u8bfb\u53d6\u672a\u521d\u59cb\u5316\u5185\u5b58\uff0c\u5bfc\u81f4\u6cc4\u6f0f\u654f\u611f\u6570\u636e\u7ed9\u6269\u5c55(CVE-2008-2807)\u3002\r\n-firefox\u8f6c\u4e49\u672c\u5730\u6587\u4ef6\u540d\u5217\u8868\u5b58\u5728\u7f3a\u9677\uff0c\u5982\u679c\u7528\u6237\u88ab\u8bf1\u4f7f\u8bbf\u95ee\u5305\u542b\u6076\u610f\u6587\u4ef6\u540d\u7684\u672c\u5730\u76ee\u5f55\uff0c\u53ef\u5bfc\u81f4\u4ee5\u8fd0\u884cFirefox\u7528\u6237\u6743\u9650\u6267\u884c\u4efb\u610fJavaScript\u3002\r\n-Firefox\u663e\u793a\u81ea\u7b7e\u540d\u8bc1\u4e66\u4fe1\u606f\u5b58\u5728\u7f3a\u9677\uff0c\u5982\u679c\u81ea\u7b7e\u540d\u8bc1\u4e66\u5305\u542b\u591a\u4e2a\u9884\u5907\u540d\u6761\u76ee\uff0c\u7f3a\u9677\u53ef\u5bfc\u81f4\u4e0d\u663e\u793a\u4e2a\u7528\u6237\uff0c\u5bfc\u81f4\u9519\u8bef\u7684\u6269\u5c55\u53ef\u4fe1\u8bc1\u4e66\u5230\u4e0d\u53ef\u4fe1\u7ad9\u70b9\u3002\n\nUbuntu Ubuntu Linux 7.10 sparc\r\nUbuntu Ubuntu Linux 7.10 powerpc\r\nUbuntu Ubuntu Linux 7.10 lpia\r\nUbuntu Ubuntu Linux 7.10 i386\r\nUbuntu Ubuntu Linux 7.10 amd64\r\nUbuntu Ubuntu Linux 7.04 sparc\r\nUbuntu Ubuntu Linux 7.04 powerpc\r\nUbuntu Ubuntu Linux 7.04 i386\r\nUbuntu Ubuntu Linux 7.04 amd64\r\nUbuntu Ubuntu Linux 6.06 LTS sparc\r\nUbuntu Ubuntu Linux 6.06 LTS powerpc\r\nUbuntu Ubuntu Linux 6.06 LTS i386\r\nUbuntu Ubuntu Linux 6.06 LTS amd64\r\nRedHat Enterprise Linux WS 4\r\nRedHat Enterprise Linux WS 3\r\nRedHat Enterprise Linux WS 2.1\r\nRedHat Enterprise Linux ES 4\r\nRedHat Enterprise Linux ES 3\r\nRedHat Enterprise Linux ES 2.1\r\nRedHat Enterprise Linux Desktop Workstation 5 client\r\nRedHat Enterprise Linux Desktop 5 client\r\nRedHat Enterprise Linux AS 4\r\nRedHat Enterprise Linux AS 3\r\nRedHat Enterprise Linux AS 2.1\r\nRedHat Enterprise Linux 5 server\r\nRedHat Desktop 4.0\r\nRedHat Desktop 3.0\r\nRedHat Advanced Workstation for the Itanium Processor 2.1\r\nMozilla SeaMonkey 1.1.9\r\nMozilla SeaMonkey 1.1.8\r\nMozilla SeaMonkey 1.1.7\r\nMozilla SeaMonkey 1.1.6\r\nMozilla SeaMonkey 1.1.5\r\nMozilla SeaMonkey 1.1.4\r\nMozilla SeaMonkey 1.1.3\r\nMozilla SeaMonkey 1.1.2\r\nMozilla SeaMonkey 1.1.1\r\nMozilla SeaMonkey 1.1 beta\r\nMozilla Firefox 2.0 8\r\nMozilla Firefox 2.0 .9\r\nMozilla Firefox 2.0 .7\r\nMozilla Firefox 2.0 .6\r\nMozilla Firefox 2.0 .5\r\nMozilla Firefox 2.0 .4\r\nMozilla Firefox 2.0 .10\r\nMozilla Firefox 2.0 .1\r\nMozilla Firefox 2.0.0.3\r\nMozilla Firefox 2.0.0.2\r\nMozilla Firefox 2.0.0.14\r\nMozilla Firefox 2.0.0.13\r\nMozilla Firefox 2.0.0.12\r\nMozilla Firefox 2.0.0.11\r\nMozilla Firefox 2.0 RC3\r\nMozilla Firefox 2.0 RC2\r\nMozilla Firefox 2.0 beta 1\r\nMozilla Firefox 2.0\r\n\n \u5347\u7ea7\u7a0b\u5e8f\uff1a\r\nMozilla Firefox 2.0.0.3\r\n * Mozilla Mozilla Firefox Download\r\n <a href=http://www.mozilla.com/en-US/firefox/all.html target=_blank>http://www.mozilla.com/en-US/firefox/all.html</a>\r\nMozilla Firefox 2.0.0.12\r\n * Mozilla Mozilla Firefox Download\r\n <a href=http://www.mozilla.com/en-US/firefox/all.html target=_blank>http://www.mozilla.com/en-US/firefox/all.html</a>\r\nMozilla Firefox 2.0.0.11\r\n * Mozilla Mozilla Firefox Download\r\n <a href=http://www.mozilla.com/en-US/firefox/all.html target=_blank>http://www.mozilla.com/en-US/firefox/all.html</a>\r\nMozilla Firefox 2.0.0.2\r\n * Mozilla Mozilla Firefox Download\r\n <a href=http://www.mozilla.com/en-US/firefox/all.html target=_blank>http://www.mozilla.com/en-US/firefox/all.html</a>\r\nMozilla Firefox 2.0 RC2\r\n * Mozilla Mozilla Firefox Download\r\n <a href=http://www.mozilla.com/en-US/firefox/all.html target=_blank>http://www.mozilla.com/en-US/firefox/all.html</a>\r\nMozilla Firefox 2.0\r\n * Mozilla Mozilla Firefox Download\r\n <a href=http://www.mozilla.com/en-US/firefox/all.html target=_blank>http://www.mozilla.com/en-US/firefox/all.html</a>\r\nMozilla Firefox 2.0 RC3\r\n * Mozilla Mozilla Firefox Download\r\n <a href=http://www.mozilla.com/en-US/firefox/all.html target=_blank>http://www.mozilla.com/en-US/firefox/all.html</a>\r\nMozilla Firefox 2.0 beta 1\r\n * Mozilla Mozilla Firefox Download\r\n <a href=http://www.mozilla.com/en-US/firefox/all.html target=_blank>http://www.mozilla.com/en-US/firefox/all.html</a>\r\nMozilla Firefox 2.0 .9\r\n * Mozilla Mozilla Firefox Download\r\n <a href=http://www.mozilla.com/en-US/firefox/all.html target=_blank>http://www.mozilla.com/en-US/firefox/all.html</a>\r\nMozilla Firefox 2.0 .6\r\n * Mozilla Mozilla Firefox Download\r\n <a href=http://www.mozilla.com/en-US/firefox/all.html target=_blank>http://www.mozilla.com/en-US/firefox/all.html</a>\r\nMozilla Firefox 2.0 .5\r\n * Mozilla Mozilla Firefox Download\r\n <a href=http://www.mozilla.com/en-US/firefox/all.html target=_blank>http://www.mozilla.com/en-US/firefox/all.html</a>\r\nMozilla Firefox 2.0 .1\r\n * Mozilla Mozilla Firefox Download\r\n <a href=http://www.mozilla.com/en-US/firefox/all.html target=_blank>http://www.mozilla.com/en-US/firefox/all.html</a>\r\nMozilla Firefox 2.0 8\r\n * Mozilla Mozilla Firefox Download\r\n <a href=http://www.mozilla.com/en-US/firefox/all.html target=_blank>http://www.mozilla.com/en-US/firefox/all.html</a>\r\nMozilla Firefox 2.0 .7\r\n * Mozilla Mozilla Firefox Download\r\n <a href=http://www.mozilla.com/en-US/firefox/all.html target=_blank>http://www.mozilla.com/en-US/firefox/all.html</a>\r\nMozilla Firefox 2.0 .10\r\n * Mozilla Mozilla Firefox Download\r\n <a href=http://www.mozilla.com/en-US/firefox/all.html target=_blank>http://www.mozilla.com/en-US/firefox/all.html</a>\r\nMozilla Firefox 2.0 .4\r\n * Mozilla Mozilla Firefox Download\r\n <a href=http://www.mozilla.com/en-US/firefox/all.html target=_blank>http://www.mozilla.com/en-US/firefox/all.html</a>", "published": "2008-07-03T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.seebug.org/vuldb/ssvid-3533", "cvelist": ["CVE-2008-2798", "CVE-2008-2799", "CVE-2008-2800", "CVE-2008-2801", "CVE-2008-2802", "CVE-2008-2803", "CVE-2008-2805", "CVE-2008-2806", "CVE-2008-2807", "CVE-2008-2808", "CVE-2008-2809", "CVE-2008-2810", "CVE-2008-2811"], "lastseen": "2017-11-19T21:38:55"}], "redhat": [{"id": "RHSA-2008:0547", "type": "redhat", "title": "(RHSA-2008:0547) Critical: seamonkey security update", "description": "SeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nMultiple flaws were found in the processing of malformed JavaScript\ncontent. A web page containing such malicious content could cause SeaMonkey\nto crash or, potentially, execute arbitrary code as the user running\nSeaMonkey. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803)\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause SeaMonkey to crash or,\npotentially, execute arbitrary code as the user running SeaMonkey.\n(CVE-2008-2798, CVE-2008-2799, CVE-2008-2811)\n\nSeveral flaws were found in the way malformed web content was displayed. A\nweb page containing specially-crafted content could potentially trick a\nSeaMonkey user into surrendering sensitive information. (CVE-2008-2800)\n\nTwo local file disclosure flaws were found in SeaMonkey. A web page\ncontaining malicious content could cause SeaMonkey to reveal the contents\nof a local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810)\n\nA flaw was found in the way a malformed .properties file was processed by\nSeaMonkey. A malicious extension could read uninitialized memory, possibly\nleaking sensitive data to the extension. (CVE-2008-2807)\n\nA flaw was found in the way SeaMonkey escaped a listing of local file\nnames. If a user could be tricked into listing a local directory containing\nmalicious file names, arbitrary JavaScript could be run with the\npermissions of the user running SeaMonkey. (CVE-2008-2808)\n\nA flaw was found in the way SeaMonkey displayed information about\nself-signed certificates. It was possible for a self-signed certificate to\ncontain multiple alternate name entries, which were not all displayed to\nthe user, allowing them to mistakenly extend trust to an unknown site.\n(CVE-2008-2809)\n\nAll SeaMonkey users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.\n", "published": "2008-07-02T04:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://access.redhat.com/errata/RHSA-2008:0547", "cvelist": ["CVE-2008-2798", "CVE-2008-2799", "CVE-2008-2800", "CVE-2008-2801", "CVE-2008-2802", "CVE-2008-2803", "CVE-2008-2805", "CVE-2008-2807", "CVE-2008-2808", "CVE-2008-2809", "CVE-2008-2810", "CVE-2008-2811"], "lastseen": "2018-03-14T15:43:53"}, {"id": "RHSA-2008:0569", "type": "redhat", "title": "(RHSA-2008:0569) Critical: firefox security update", "description": "Mozilla Firefox is an open source Web browser.\n\nMultiple flaws were found in the processing of malformed JavaScript\ncontent. A web page containing such malicious content could cause Firefox\nto crash or, potentially, execute arbitrary code as the user running\nFirefox. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803)\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Firefox to crash or,\npotentially, execute arbitrary code as the user running Firefox.\n(CVE-2008-2798, CVE-2008-2799, CVE-2008-2811)\n\nSeveral flaws were found in the way malformed web content was displayed. A\nweb page containing specially-crafted content could potentially trick a\nFirefox user into surrendering sensitive information. (CVE-2008-2800)\n\nTwo local file disclosure flaws were found in Firefox. A web page\ncontaining malicious content could cause Firefox to reveal the contents of\na local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810)\n\nA flaw was found in the way a malformed .properties file was processed by\nFirefox. A malicious extension could read uninitialized memory, possibly\nleaking sensitive data to the extension. (CVE-2008-2807)\n\nA flaw was found in the way Firefox escaped a listing of local file names.\nIf a user could be tricked into listing a local directory containing\nmalicious file names, arbitrary JavaScript could be run with the\npermissions of the user running Firefox. (CVE-2008-2808)\n\nA flaw was found in the way Firefox displayed information about self-signed\ncertificates. It was possible for a self-signed certificate to contain\nmultiple alternate name entries, which were not all displayed to the user,\nallowing them to mistakenly extend trust to an unknown site.\n(CVE-2008-2809)\n\nAll Mozilla Firefox users should upgrade to these updated packages, which\ncontain backported patches that correct these issues.", "published": "2008-07-02T04:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://access.redhat.com/errata/RHSA-2008:0569", "cvelist": ["CVE-2008-2798", "CVE-2008-2799", "CVE-2008-2800", "CVE-2008-2801", "CVE-2008-2802", "CVE-2008-2803", "CVE-2008-2805", "CVE-2008-2807", "CVE-2008-2808", "CVE-2008-2809", "CVE-2008-2810", "CVE-2008-2811"], "lastseen": "2017-09-09T07:19:39"}, {"id": "RHSA-2008:0616", "type": "redhat", "title": "(RHSA-2008:0616) Moderate: thunderbird security update", "description": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nMultiple flaws were found in the processing of malformed JavaScript\ncontent. An HTML mail containing such malicious content could cause\nThunderbird to crash or, potentially, execute arbitrary code as the user\nrunning Thunderbird. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803)\n\nSeveral flaws were found in the processing of malformed HTML content. An\nHTML mail containing malicious content could cause Thunderbird to crash or,\npotentially, execute arbitrary code as the user running Thunderbird.\n(CVE-2008-2785, CVE-2008-2798, CVE-2008-2799, CVE-2008-2811)\n\nSeveral flaws were found in the way malformed HTML content was displayed.\nAn HTML mail containing specially-crafted content could, potentially, trick\na Thunderbird user into surrendering sensitive information. (CVE-2008-2800)\n\nTwo local file disclosure flaws were found in Thunderbird. An HTML mail\ncontaining malicious content could cause Thunderbird to reveal the contents\nof a local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810)\n\nA flaw was found in the way a malformed .properties file was processed by\nThunderbird. A malicious extension could read uninitialized memory,\npossibly leaking sensitive data to the extension. (CVE-2008-2807)\n\nA flaw was found in the way Thunderbird escaped a listing of local file\nnames. If a user could be tricked into listing a local directory containing\nmalicious file names, arbitrary JavaScript could be run with the\npermissions of the user running Thunderbird. (CVE-2008-2808)\n\nA flaw was found in the way Thunderbird displayed information about\nself-signed certificates. It was possible for a self-signed certificate to\ncontain multiple alternate name entries, which were not all displayed to\nthe user, allowing them to mistakenly extend trust to an unknown site.\n(CVE-2008-2809)\n\nNote: JavaScript support is disabled by default in Thunderbird. The above\nissues are not exploitable unless JavaScript is enabled.\n\nAll Thunderbird users should upgrade to these updated packages, which\ncontain backported patches to resolve these issues.", "published": "2008-07-23T04:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://access.redhat.com/errata/RHSA-2008:0616", "cvelist": ["CVE-2008-2785", "CVE-2008-2798", "CVE-2008-2799", "CVE-2008-2800", "CVE-2008-2801", "CVE-2008-2802", "CVE-2008-2803", "CVE-2008-2805", "CVE-2008-2807", "CVE-2008-2808", "CVE-2008-2809", "CVE-2008-2810", "CVE-2008-2811"], "lastseen": "2017-09-08T13:20:30"}, {"id": "RHSA-2008:0549", "type": "redhat", "title": "(RHSA-2008:0549) Critical: firefox security update", "description": "Mozilla Firefox is an open source Web browser.\n\nMultiple flaws were found in the processing of malformed JavaScript\ncontent. A web page containing such malicious content could cause Firefox\nto crash or, potentially, execute arbitrary code as the user running\nFirefox. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803)\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Firefox to crash or,\npotentially, execute arbitrary code as the user running Firefox.\n(CVE-2008-2798, CVE-2008-2799, CVE-2008-2811)\n\nSeveral flaws were found in the way malformed web content was displayed. A\nweb page containing specially-crafted content could potentially trick a\nFirefox user into surrendering sensitive information. (CVE-2008-2800)\n\nTwo local file disclosure flaws were found in Firefox. A web page\ncontaining malicious content could cause Firefox to reveal the contents of\na local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810)\n\nA flaw was found in the way a malformed .properties file was processed by\nFirefox. A malicious extension could read uninitialized memory, possibly\nleaking sensitive data to the extension. (CVE-2008-2807)\n\nA flaw was found in the way Firefox escaped a listing of local file names.\nIf a user could be tricked into listing a local directory containing\nmalicious file names, arbitrary JavaScript could be run with the\npermissions of the user running Firefox. (CVE-2008-2808)\n\nA flaw was found in the way Firefox displayed information about self-signed\ncertificates. It was possible for a self-signed certificate to contain\nmultiple alternate name entries, which were not all displayed to the user,\nallowing them to mistakenly extend trust to an unknown site.\n(CVE-2008-2809)\n\nAll Mozilla Firefox users should upgrade to this updated package, which\ncontains backported patches that correct these issues.", "published": "2008-07-02T04:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://access.redhat.com/errata/RHSA-2008:0549", "cvelist": ["CVE-2008-2798", "CVE-2008-2799", "CVE-2008-2800", "CVE-2008-2801", "CVE-2008-2802", "CVE-2008-2803", "CVE-2008-2805", "CVE-2008-2807", "CVE-2008-2808", "CVE-2008-2809", "CVE-2008-2810", "CVE-2008-2811"], "lastseen": "2017-09-09T07:19:57"}], "nessus": [{"id": "SL_20080702_FIREFOX_ON_SL_5_2.NASL", "type": "nessus", "title": "Scientific Linux Security Update : firefox on SL 5.2 i386/x86_64", "description": "Multiple flaws were found in the processing of malformed JavaScript content. A web page containing such malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803)\n\nSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox.\n(CVE-2008-2798, CVE-2008-2799, CVE-2008-2811)\n\nSeveral flaws were found in the way malformed web content was displayed. A web page containing specially crafted content could potentially trick a Firefox user into surrendering sensitive information. (CVE-2008-2800)\n\nTwo local file disclosure flaws were found in Firefox. A web page containing malicious content could cause Firefox to reveal the contents of a local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810)\n\nA flaw was found in the way a malformed .properties file was processed by Firefox. A malicious extension could read uninitialized memory, possibly leaking sensitive data to the extension. (CVE-2008-2807)\n\nA flaw was found in the way Firefox escaped a listing of local file names. If a user could be tricked into listing a local directory containing malicious file names, arbitrary JavaScript could be run with the permissions of the user running Firefox. (CVE-2008-2808)\n\nA flaw was found in the way Firefox displayed information about self-signed certificates. It was possible for a self-signed certificate to contain multiple alternate name entries, which were not all displayed to the user, allowing them to mistakenly extend trust to an unknown site. (CVE-2008-2809)", "published": "2012-08-01T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=60434", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2017-10-29T13:38:29"}, {"id": "DEBIAN_DSA-1615.NASL", "type": "nessus", "title": "Debian DSA-1615-1 : xulrunner - several vulnerabilities", "description": "Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications. The Common Vulnerabilities and Exposures project identifies the following problems :\n\n - CVE-2008-2785 It was discovered that missing boundary checks on a reference counter for CSS objects can lead to the execution of arbitrary code.\n\n - CVE-2008-2798 Devon Hubbard, Jesse Ruderman and Martijn Wargers discovered crashes in the layout engine, which might allow the execution of arbitrary code.\n\n - CVE-2008-2799 Igor Bukanov, Jesse Ruderman and Gary Kwong discovered crashes in the JavaScript engine, which might allow the execution of arbitrary code.\n\n - CVE-2008-2800 'moz_bug_r_a4' discovered several cross-site scripting vulnerabilities.\n\n - CVE-2008-2801 Collin Jackson and Adam Barth discovered that JavaScript code could be executed in the context of signed JAR archives.\n\n - CVE-2008-2802 'moz_bug_r_a4' discovered that XUL documents can escalate privileges by accessing the pre-compiled 'fastload' file.\n\n - CVE-2008-2803 'moz_bug_r_a4' discovered that missing input sanitising in the mozIJSSubScriptLoader.loadSubScript() function could lead to the execution of arbitrary code. Iceweasel itself is not affected, but some addons are.\n\n - CVE-2008-2805 Claudio Santambrogio discovered that missing access validation in DOM parsing allows malicious websites to force the browser to upload local files to the server, which could lead to information disclosure.\n\n - CVE-2008-2807 Daniel Glazman discovered that a programming error in the code for parsing .properties files could lead to memory content being exposed to addons, which could lead to information disclosure.\n\n - CVE-2008-2808 Masahiro Yamada discovered that file URLs in directory listings were insufficiently escaped.\n\n - CVE-2008-2809 John G. Myers, Frank Benkstein and Nils Toedtmann discovered that alternate names on self-signed certificates were handled insufficiently, which could lead to spoofing of secure connections.\n\n - CVE-2008-2811 Greg McManus discovered a crash in the block reflow code, which might allow the execution of arbitrary code.\n\n - CVE-2008-2933 Billy Rios discovered that passing an URL containing a pipe symbol to Iceweasel can lead to Chrome privilege escalation.", "published": "2008-07-24T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=33567", "cvelist": ["CVE-2008-2933", "CVE-2008-2801", "CVE-2008-2785", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2017-10-29T13:44:05"}, {"id": "MOZILLA_FIREFOX_20015.NASL", "type": "nessus", "title": "Firefox < 2.0.0.15 Multiple Vulnerabilities", "description": "The installed version of Firefox is affected by various security issues :\n\n - Several stability bugs leading to crashes which, in some cases, show traces of memory corruption (MFSA 2008-21).\n\n - A vulnerability involving violation of the same-origin policy could allow for cross-site scripting attacks (MFSA 2008-22).\n\n - JavaScript can be injected into the context of signed JARs and executed under the context of the JAR's signer (MFSA 2008-23).\n\n - By taking advantage of the privilege level stored in the pre-compiled 'fastload' file, an attacker may be able to run arbitrary JavaScript code with chrome privileges (MFSA 2008-24).\n\n - Arbitrary code execution is possible in 'mozIJSSubScriptLoader.loadSubScript()' (MFSA 2008-25).\n\n - An attacker can steal files from known locations on a victim's computer via originalTarget and DOM Range (MFSA 2008-27).\n\n - It is possible for a malicious Java applet to bypass the same-origin policy and create arbitrary socket connections to other domains (MFSA 2008-28).\n\n - An improperly encoded '.properties' file in an add-on can result in uninitialized memory being used, which could lead to data formerly used by other programs being exposed to the add-on code (MFSA 2008-29).\n\n - File URLs in directory listings are not properly HTML- escaped when the filenames contained particular characters (MFSA 2008-30).\n\n - A weakness in the trust model regarding alt names on peer-trusted certs could lead to spoofing secure connections to any other site (MFSA 2008-31).\n\n - URL shortcut files on Windows (for example, saved IE favorites) could be interpreted as if they were in the local file context when opened by Firefox, although the referenced remote content would be downloaded and displayed (MFSA 2008-32).\n\n - A crash in Mozilla's block reflow code could be used by an attacker to crash the browser and run arbitrary code on the victim's computer (MFSA 2008-33).", "published": "2008-07-02T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=33393", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798", "CVE-2008-2806"], "lastseen": "2017-10-29T13:43:31"}, {"id": "SL_20080702_FIREFOX_ON_SL4_X.NASL", "type": "nessus", "title": "Scientific Linux Security Update : firefox on SL4.x i386/x86_64", "description": "Multiple flaws were found in the processing of malformed JavaScript content. A web page containing such malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803)\n\nSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox.\n(CVE-2008-2798, CVE-2008-2799, CVE-2008-2811)\n\nSeveral flaws were found in the way malformed web content was displayed. A web page containing specially crafted content could potentially trick a Firefox user into surrendering sensitive information. (CVE-2008-2800)\n\nTwo local file disclosure flaws were found in Firefox. A web page containing malicious content could cause Firefox to reveal the contents of a local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810)\n\nA flaw was found in the way a malformed .properties file was processed by Firefox. A malicious extension could read uninitialized memory, possibly leaking sensitive data to the extension. (CVE-2008-2807)\n\nA flaw was found in the way Firefox escaped a listing of local file names. If a user could be tricked into listing a local directory containing malicious file names, arbitrary JavaScript could be run with the permissions of the user running Firefox. (CVE-2008-2808)\n\nA flaw was found in the way Firefox displayed information about self-signed certificates. It was possible for a self-signed certificate to contain multiple alternate name entries, which were not all displayed to the user, allowing them to mistakenly extend trust to an unknown site. (CVE-2008-2809)", "published": "2012-08-01T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=60433", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2017-10-29T13:45:42"}, {"id": "CENTOS_RHSA-2008-0547.NASL", "type": "nessus", "title": "CentOS 3 / 4 : seamonkey (CESA-2008:0547)", "description": "Updated SeaMonkey packages that fix a security issues are now available for Red Hat Enterprise Linux 2.1, Red Hat Enterprise Linux 3 and Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red Hat Security Response Team.\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor.\n\nMultiple flaws were found in the processing of malformed JavaScript content. A web page containing such malicious content could cause SeaMonkey to crash or, potentially, execute arbitrary code as the user running SeaMonkey. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803)\n\nSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause SeaMonkey to crash or, potentially, execute arbitrary code as the user running SeaMonkey.\n(CVE-2008-2798, CVE-2008-2799, CVE-2008-2811)\n\nSeveral flaws were found in the way malformed web content was displayed. A web page containing specially crafted content could potentially trick a SeaMonkey user into surrendering sensitive information. (CVE-2008-2800)\n\nTwo local file disclosure flaws were found in SeaMonkey. A web page containing malicious content could cause SeaMonkey to reveal the contents of a local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810)\n\nA flaw was found in the way a malformed .properties file was processed by SeaMonkey. A malicious extension could read uninitialized memory, possibly leaking sensitive data to the extension. (CVE-2008-2807)\n\nA flaw was found in the way SeaMonkey escaped a listing of local file names. If a user could be tricked into listing a local directory containing malicious file names, arbitrary JavaScript could be run with the permissions of the user running SeaMonkey. (CVE-2008-2808)\n\nA flaw was found in the way SeaMonkey displayed information about self-signed certificates. It was possible for a self-signed certificate to contain multiple alternate name entries, which were not all displayed to the user, allowing them to mistakenly extend trust to an unknown site. (CVE-2008-2809)\n\nAll SeaMonkey users should upgrade to these updated packages, which contain backported patches to resolve these issues.", "published": "2008-07-08T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=33399", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2017-10-29T13:43:13"}, {"id": "SL_20080702_SEAMONKEY_ON_SL3_X.NASL", "type": "nessus", "title": "Scientific Linux Security Update : seamonkey on SL3.x, SL4.x i386/x86_64", "description": "Multiple flaws were found in the processing of malformed JavaScript content. A web page containing such malicious content could cause SeaMonkey to crash or, potentially, execute arbitrary code as the user running SeaMonkey. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803)\n\nSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause SeaMonkey to crash or, potentially, execute arbitrary code as the user running SeaMonkey.\n(CVE-2008-2798, CVE-2008-2799, CVE-2008-2811)\n\nSeveral flaws were found in the way malformed web content was displayed. A web page containing specially crafted content could potentially trick a SeaMonkey user into surrendering sensitive information. (CVE-2008-2800)\n\nTwo local file disclosure flaws were found in SeaMonkey. A web page containing malicious content could cause SeaMonkey to reveal the contents of a local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810)\n\nA flaw was found in the way a malformed .properties file was processed by SeaMonkey. A malicious extension could read uninitialized memory, possibly leaking sensitive data to the extension. (CVE-2008-2807)\n\nA flaw was found in the way SeaMonkey escaped a listing of local file names. If a user could be tricked into listing a local directory containing malicious file names, arbitrary JavaScript could be run with the permissions of the user running SeaMonkey. (CVE-2008-2808)\n\nA flaw was found in the way SeaMonkey displayed information about self-signed certificates. It was possible for a self-signed certificate to contain multiple alternate name entries, which were not all displayed to the user, allowing them to mistakenly extend trust to an unknown site. (CVE-2008-2809)", "published": "2012-08-01T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=60435", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2017-10-29T13:42:50"}, {"id": "DEBIAN_DSA-1607.NASL", "type": "nessus", "title": "Debian DSA-1607-1 : iceweasel - several vulnerabilities", "description": "Several remote vulnerabilities have been discovered in the Iceweasel webbrowser, an unbranded version of the Firefox browser. The Common Vulnerabilities and Exposures project identifies the following problems :\n\n - CVE-2008-2798 Devon Hubbard, Jesse Ruderman and Martijn Wargers discovered crashes in the layout engine, which might allow the execution of arbitrary code.\n\n - CVE-2008-2799 Igor Bukanov, Jesse Ruderman and Gary Kwong discovered crashes in the JavaScript engine, which might allow the execution of arbitrary code.\n\n - CVE-2008-2800 'moz_bug_r_a4' discovered several cross-site scripting vulnerabilities.\n\n - CVE-2008-2801 Collin Jackson and Adam Barth discovered that JavaScript code could be executed in the context of signed JAR archives.\n\n - CVE-2008-2802 'moz_bug_r_a4' discovered that XUL documents can escalate privileges by accessing the pre-compiled 'fastload' file.\n\n - CVE-2008-2803 'moz_bug_r_a4' discovered that missing input sanitising in the mozIJSSubScriptLoader.loadSubScript() function could lead to the execution of arbitrary code. Iceweasel itself is not affected, but some addons are.\n\n - CVE-2008-2805 Claudio Santambrogio discovered that missing access validation in DOM parsing allows malicious websites to force the browser to upload local files to the server, which could lead to information disclosure.\n\n - CVE-2008-2807 Daniel Glazman discovered that a programming error in the code for parsing .properties files could lead to memory content being exposed to addons, which could lead to information disclosure.\n\n - CVE-2008-2808 Masahiro Yamada discovered that file URLS in directory listings were insufficiently escaped.\n\n - CVE-2008-2809 John G. Myers, Frank Benkstein and Nils Toedtmann discovered that alternate names on self-signed certificates were handled insufficiently, which could lead to spoofings secure connections.\n\n - CVE-2008-2811 Greg McManus discovered a crash in the block reflow code, which might allow the execution of arbitrary code.", "published": "2008-07-15T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=33491", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2017-10-29T13:38:16"}, {"id": "FEDORA_2008-6196.NASL", "type": "nessus", "title": "Fedora 8 : seamonkey-1.1.10-1.fc8 (2008-6196)", "description": "Updated seamonkey packages that fix several security issues are now available for Fedora 8. SeaMonkey is an all-in-one Internet application suite. It includes a browser, mail/news client, IRC client, JavaScript debugger, and a tool to inspect the DOM for web pages. It is derived from the application formerly known as Mozilla Application Suite. Multiple flaws were found in the processing of malformed JavaScript content. A web page containing such malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803) Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2008-2798, CVE-2008-2799, CVE-2008-2811) Several flaws were found in the way malformed web content was displayed. A web page containing specially crafted content could potentially trick a Firefox user into surrendering sensitive information. (CVE-2008-2800) Two local file disclosure flaws were found in Firefox. A web page containing malicious content could cause Firefox to reveal the contents of a local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810) A flaw was found in the way a malformed .properties file was processed by Firefox. A malicious extension could read uninitialized memory, possibly leaking sensitive data to the extension. (CVE-2008-2807) A flaw was found in the way Firefox escaped a listing of local file names. If a user could be tricked into listing a local directory containing malicious file names, arbitrary JavaScript could be run with the permissions of the user running Firefox. (CVE-2008-2808) A flaw was found in the way Firefox displayed information about self-signed certificates. It was possible for a self-signed certificate to contain multiple alternate name entries, which were not all displayed to the user, allowing them to mistakenly extend trust to an unknown site. (CVE-2008-2809) Updated packages update SeaMonkey to upstream version 1.1.10 to address these flaws:\nhttp://www.mozilla.org/projects/security/known- vulnerabilities.html#seamonkey1.1.10\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2008-07-10T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=33455", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798", "CVE-2008-2806"], "lastseen": "2017-10-29T13:37:38"}, {"id": "REDHAT-RHSA-2008-0549.NASL", "type": "nessus", "title": "RHEL 4 : firefox (RHSA-2008:0549)", "description": "An updated firefox package that fixes several security issues is now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red Hat Security Response Team.\n\nMozilla Firefox is an open source Web browser.\n\nMultiple flaws were found in the processing of malformed JavaScript content. A web page containing such malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803)\n\nSeveral flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code as the user running Firefox.\n(CVE-2008-2798, CVE-2008-2799, CVE-2008-2811)\n\nSeveral flaws were found in the way malformed web content was displayed. A web page containing specially crafted content could potentially trick a Firefox user into surrendering sensitive information. (CVE-2008-2800)\n\nTwo local file disclosure flaws were found in Firefox. A web page containing malicious content could cause Firefox to reveal the contents of a local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810)\n\nA flaw was found in the way a malformed .properties file was processed by Firefox. A malicious extension could read uninitialized memory, possibly leaking sensitive data to the extension. (CVE-2008-2807)\n\nA flaw was found in the way Firefox escaped a listing of local file names. If a user could be tricked into listing a local directory containing malicious file names, arbitrary JavaScript could be run with the permissions of the user running Firefox. (CVE-2008-2808)\n\nA flaw was found in the way Firefox displayed information about self-signed certificates. It was possible for a self-signed certificate to contain multiple alternate name entries, which were not all displayed to the user, allowing them to mistakenly extend trust to an unknown site. (CVE-2008-2809)\n\nAll Mozilla Firefox users should upgrade to this updated package, which contains backported patches that correct these issues.", "published": "2008-07-08T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=33424", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2017-10-29T13:43:17"}, {"id": "SUSE_MOZILLAFIREFOX-5411.NASL", "type": "nessus", "title": "openSUSE 10 Security Update : MozillaFirefox (MozillaFirefox-5411)", "description": "Mozilla Firefox was updated to version 2.0.0.15, fixing various bugs including following security bugs :\n\nCVE-2008-2798 CVE-2008-2799 MFSA-2008-21: Mozilla developers identified and fixed several stability bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these crashes showed evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code.\n\nCVE-2008-2800 MFSA-2008-22: Mozilla contributor moz_bug_r_a4 submitted a set of vulnerabilities which allow scripts from one document to be executed in the context of a different document. These vulnerabilities could be used by an attacker to violate the same-origin policy and perform an XSS attack.\n\nCVE-2008-2801 MFSA-2008-23: Security researcher Collin Jackson reported a series of vulnerabilities which allow JavaScript to be injected into signed JARs and executed under the context of the JAR's signer. This could allow an attacker to run JavaScript in a victim's browser with the privileges of a different website, provided the attacker possesses a JAR signed by the other website.\n\nCVE-2008-2802 MFSA-2008-24: Mozilla contributor moz_bug_r_a4 reported a vulnerability that allowed non-priviliged XUL documents to load chrome scripts from the fastload file. This could allow an attacker to run arbitrary JavaScript code with chrome privileges.\n\nCVE-2008-2803 MFSA-2008-25: Mozilla contributor moz_bug_r_a4 reported a vulnerability which allows arbitrary JavaScript to be executed with chrome privileges. The privilege escalation was possible because JavaScript loaded via mozIJSSubScriptLoader.loadSubScript() was not using XPCNativeWrappers when accessing content. This could allow an attacker to overwrite trusted objects with arbitrary code which would be executed with chrome privileges when the trusted objects were called by the browser.\n\nCVE-2008-2805 MFSA-2008-27: Opera developer Claudio Santambrogio reported a vulnerability which allows malicious content to force the browser into uploading local files to the remote server. This could be used by an attacker to steal arbitrary files from a victim's computer.\n\nCVE-2008-2806 MFSA-2008-28: Security researcher Gregory Fleischer reported a vulnerability in the way Mozilla indicates the origin of a document to the Java plugin. This vulnerability could allow a malicious Java applet to bypass the same-origin policy and create arbitrary socket connections to other domains.\n\nCVE-2008-2807 MFSA-2008-29: Mozilla developer Daniel Glazman demonstrated that an improperly encoded .properties file in an add-on can result in uninitialized memory being used. This could potentially result in small chunks of data from other programs being exposed in the browser.\n\nCVE-2008-2808 MFSA-2008-30: Mozilla contributor Masahiro Yamada reported that file URLs in directory listings were not being HTML escaped properly when the filenames contained particular characters.\nThis resulted in files from directory listings being opened in unintended ways or files not being able to be opened by the browser altogether.\n\nCVE-2008-2809 MFSA-2008-31: Mozilla developer John G. Myers reported a weakness in the trust model used by Mozilla regarding alternate names on self-signed certificates. A user could be prompted to accept a self-signed certificate from a website which includes alt-name entries. If the user accepted the certificate, they would also extend trust to any alternate domains listed in the certificate, despite not being prompted about the additional domains. This technique could be used by an attacker to impersonate another server.\n\nCVE-2008-2810 MFSA-2008-32: Mozilla community member Geoff reported a vulnerability in the way Mozilla opens URL files sent directly to the browser. He demonstrated that such files were opened with local file privileges, giving the remote content access to read from the local filesystem. If a user opened a bookmark to a malicious page in this manner, the page could potentially read from other local files on the user's computer.\n\nCVE-2008-2811 MFSA 2008-33: Security research firm Astabis, via the iSIGHT Partners GVP Program, reported a vulnerability in Mozilla's block reflow code. This vulnerablitity could be used by an attacker to crash the browser and run arbitrary code on the victim's computer.", "published": "2008-07-15T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=33499", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798", "CVE-2008-2806"], "lastseen": "2017-10-29T13:45:13"}], "centos": [{"id": "CESA-2008:0549", "type": "centos", "title": "firefox security update", "description": "**CentOS Errata and Security Advisory** CESA-2008:0549\n\n\nMozilla Firefox is an open source Web browser.\n\nMultiple flaws were found in the processing of malformed JavaScript\ncontent. A web page containing such malicious content could cause Firefox\nto crash or, potentially, execute arbitrary code as the user running\nFirefox. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803)\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Firefox to crash or,\npotentially, execute arbitrary code as the user running Firefox.\n(CVE-2008-2798, CVE-2008-2799, CVE-2008-2811)\n\nSeveral flaws were found in the way malformed web content was displayed. A\nweb page containing specially-crafted content could potentially trick a\nFirefox user into surrendering sensitive information. (CVE-2008-2800)\n\nTwo local file disclosure flaws were found in Firefox. A web page\ncontaining malicious content could cause Firefox to reveal the contents of\na local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810)\n\nA flaw was found in the way a malformed .properties file was processed by\nFirefox. A malicious extension could read uninitialized memory, possibly\nleaking sensitive data to the extension. (CVE-2008-2807)\n\nA flaw was found in the way Firefox escaped a listing of local file names.\nIf a user could be tricked into listing a local directory containing\nmalicious file names, arbitrary JavaScript could be run with the\npermissions of the user running Firefox. (CVE-2008-2808)\n\nA flaw was found in the way Firefox displayed information about self-signed\ncertificates. It was possible for a self-signed certificate to contain\nmultiple alternate name entries, which were not all displayed to the user,\nallowing them to mistakenly extend trust to an unknown site.\n(CVE-2008-2809)\n\nAll Mozilla Firefox users should upgrade to this updated package, which\ncontains backported patches that correct these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/015058.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/015059.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/015062.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/015063.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/015067.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/015069.html\n\n**Affected packages:**\nfirefox\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2008-0549.html", "published": "2008-07-02T19:45:20", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://lists.centos.org/pipermail/centos-announce/2008-July/015058.html", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2017-10-03T18:24:36"}, {"id": "CESA-2008:0547-01", "type": "centos", "title": "seamonkey security update", "description": "**CentOS Errata and Security Advisory** CESA-2008:0547-01\n\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nMultiple flaws were found in the processing of malformed JavaScript\ncontent. A web page containing such malicious content could cause SeaMonkey\nto crash or, potentially, execute arbitrary code as the user running\nSeaMonkey. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803)\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause SeaMonkey to crash or,\npotentially, execute arbitrary code as the user running SeaMonkey.\n(CVE-2008-2798, CVE-2008-2799, CVE-2008-2811)\n\nSeveral flaws were found in the way malformed web content was displayed. A\nweb page containing specially-crafted content could potentially trick a\nSeaMonkey user into surrendering sensitive information. (CVE-2008-2800)\n\nTwo local file disclosure flaws were found in SeaMonkey. A web page\ncontaining malicious content could cause SeaMonkey to reveal the contents\nof a local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810)\n\nA flaw was found in the way a malformed .properties file was processed by\nSeaMonkey. A malicious extension could read uninitialized memory, possibly\nleaking sensitive data to the extension. (CVE-2008-2807)\n\nA flaw was found in the way SeaMonkey escaped a listing of local file\nnames. If a user could be tricked into listing a local directory containing\nmalicious file names, arbitrary JavaScript could be run with the\npermissions of the user running SeaMonkey. (CVE-2008-2808)\n\nA flaw was found in the way SeaMonkey displayed information about\nself-signed certificates. It was possible for a self-signed certificate to\ncontain multiple alternate name entries, which were not all displayed to\nthe user, allowing them to mistakenly extend trust to an unknown site.\n(CVE-2008-2809)\n\nAll SeaMonkey users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/015064.html\n\n**Affected packages:**\nseamonkey\nseamonkey-chat\nseamonkey-devel\nseamonkey-dom-inspector\nseamonkey-js-debugger\nseamonkey-mail\nseamonkey-nspr\nseamonkey-nspr-devel\nseamonkey-nss\nseamonkey-nss-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/rh21as-errata.html", "published": "2008-07-03T00:05:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://lists.centos.org/pipermail/centos-announce/2008-July/015064.html", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2017-10-03T18:26:58"}, {"id": "CESA-2008:0569", "type": "centos", "title": "devhelp, firefox, xulrunner, yelp security update", "description": "**CentOS Errata and Security Advisory** CESA-2008:0569\n\n\nMozilla Firefox is an open source Web browser.\n\nMultiple flaws were found in the processing of malformed JavaScript\ncontent. A web page containing such malicious content could cause Firefox\nto crash or, potentially, execute arbitrary code as the user running\nFirefox. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803)\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Firefox to crash or,\npotentially, execute arbitrary code as the user running Firefox.\n(CVE-2008-2798, CVE-2008-2799, CVE-2008-2811)\n\nSeveral flaws were found in the way malformed web content was displayed. A\nweb page containing specially-crafted content could potentially trick a\nFirefox user into surrendering sensitive information. (CVE-2008-2800)\n\nTwo local file disclosure flaws were found in Firefox. A web page\ncontaining malicious content could cause Firefox to reveal the contents of\na local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810)\n\nA flaw was found in the way a malformed .properties file was processed by\nFirefox. A malicious extension could read uninitialized memory, possibly\nleaking sensitive data to the extension. (CVE-2008-2807)\n\nA flaw was found in the way Firefox escaped a listing of local file names.\nIf a user could be tricked into listing a local directory containing\nmalicious file names, arbitrary JavaScript could be run with the\npermissions of the user running Firefox. (CVE-2008-2808)\n\nA flaw was found in the way Firefox displayed information about self-signed\ncertificates. It was possible for a self-signed certificate to contain\nmultiple alternate name entries, which were not all displayed to the user,\nallowing them to mistakenly extend trust to an unknown site.\n(CVE-2008-2809)\n\nAll Mozilla Firefox users should upgrade to these updated packages, which\ncontain backported patches that correct these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/015074.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/015075.html\n\n**Affected packages:**\ndevhelp\ndevhelp-devel\nfirefox\nxulrunner\nxulrunner-devel\nxulrunner-devel-unstable\nyelp\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2008-0569.html", "published": "2008-07-06T14:53:42", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://lists.centos.org/pipermail/centos-announce/2008-July/015074.html", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2017-10-03T18:25:56"}, {"id": "CESA-2008:0547", "type": "centos", "title": "seamonkey security update", "description": "**CentOS Errata and Security Advisory** CESA-2008:0547\n\n\nSeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nMultiple flaws were found in the processing of malformed JavaScript\ncontent. A web page containing such malicious content could cause SeaMonkey\nto crash or, potentially, execute arbitrary code as the user running\nSeaMonkey. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803)\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause SeaMonkey to crash or,\npotentially, execute arbitrary code as the user running SeaMonkey.\n(CVE-2008-2798, CVE-2008-2799, CVE-2008-2811)\n\nSeveral flaws were found in the way malformed web content was displayed. A\nweb page containing specially-crafted content could potentially trick a\nSeaMonkey user into surrendering sensitive information. (CVE-2008-2800)\n\nTwo local file disclosure flaws were found in SeaMonkey. A web page\ncontaining malicious content could cause SeaMonkey to reveal the contents\nof a local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810)\n\nA flaw was found in the way a malformed .properties file was processed by\nSeaMonkey. A malicious extension could read uninitialized memory, possibly\nleaking sensitive data to the extension. (CVE-2008-2807)\n\nA flaw was found in the way SeaMonkey escaped a listing of local file\nnames. If a user could be tricked into listing a local directory containing\nmalicious file names, arbitrary JavaScript could be run with the\npermissions of the user running SeaMonkey. (CVE-2008-2808)\n\nA flaw was found in the way SeaMonkey displayed information about\nself-signed certificates. It was possible for a self-signed certificate to\ncontain multiple alternate name entries, which were not all displayed to\nthe user, allowing them to mistakenly extend trust to an unknown site.\n(CVE-2008-2809)\n\nAll SeaMonkey users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/015056.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/015057.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/015060.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/015061.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/015066.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/015068.html\n\n**Affected packages:**\nseamonkey\nseamonkey-chat\nseamonkey-devel\nseamonkey-dom-inspector\nseamonkey-js-debugger\nseamonkey-mail\nseamonkey-nspr\nseamonkey-nspr-devel\nseamonkey-nss\nseamonkey-nss-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2008-0547.html", "published": "2008-07-02T19:43:27", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://lists.centos.org/pipermail/centos-announce/2008-July/015056.html", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2017-10-03T18:24:34"}, {"id": "CESA-2008:0616", "type": "centos", "title": "thunderbird security update", "description": "**CentOS Errata and Security Advisory** CESA-2008:0616\n\n\nMozilla Thunderbird is a standalone mail and newsgroup client.\n\nMultiple flaws were found in the processing of malformed JavaScript\ncontent. An HTML mail containing such malicious content could cause\nThunderbird to crash or, potentially, execute arbitrary code as the user\nrunning Thunderbird. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803)\n\nSeveral flaws were found in the processing of malformed HTML content. An\nHTML mail containing malicious content could cause Thunderbird to crash or,\npotentially, execute arbitrary code as the user running Thunderbird.\n(CVE-2008-2785, CVE-2008-2798, CVE-2008-2799, CVE-2008-2811)\n\nSeveral flaws were found in the way malformed HTML content was displayed.\nAn HTML mail containing specially-crafted content could, potentially, trick\na Thunderbird user into surrendering sensitive information. (CVE-2008-2800)\n\nTwo local file disclosure flaws were found in Thunderbird. An HTML mail\ncontaining malicious content could cause Thunderbird to reveal the contents\nof a local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810)\n\nA flaw was found in the way a malformed .properties file was processed by\nThunderbird. A malicious extension could read uninitialized memory,\npossibly leaking sensitive data to the extension. (CVE-2008-2807)\n\nA flaw was found in the way Thunderbird escaped a listing of local file\nnames. If a user could be tricked into listing a local directory containing\nmalicious file names, arbitrary JavaScript could be run with the\npermissions of the user running Thunderbird. (CVE-2008-2808)\n\nA flaw was found in the way Thunderbird displayed information about\nself-signed certificates. It was possible for a self-signed certificate to\ncontain multiple alternate name entries, which were not all displayed to\nthe user, allowing them to mistakenly extend trust to an unknown site.\n(CVE-2008-2809)\n\nNote: JavaScript support is disabled by default in Thunderbird. The above\nissues are not exploitable unless JavaScript is enabled.\n\nAll Thunderbird users should upgrade to these updated packages, which\ncontain backported patches to resolve these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/015157.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/015158.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/015159.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/015160.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/015173.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/015174.html\n\n**Affected packages:**\nthunderbird\n\n**Upstream details at:**\n\nhttps://rhn.redhat.com/errata/RHSA-2008-0616.html", "published": "2008-07-24T18:46:44", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://lists.centos.org/pipermail/centos-announce/2008-July/015157.html", "cvelist": ["CVE-2008-2801", "CVE-2008-2785", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2017-10-03T18:25:07"}], "oraclelinux": [{"id": "ELSA-2008-0549", "type": "oraclelinux", "title": "firefox security update", "description": "[1.5.0.12-0.19.0.1.el4]\n- Add firefox-oracle-default-bookmarks.html and firefox-oracle-default-prefs.js\n[1.5.0.12-0.19.el4]\n- Respun for mozilla bugs #439035,#439735,#440308\n[1.5.0.12-0.18.el4]\n- Update patchset to fix regression as per 1.8.1.15", "published": "2008-07-02T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://linux.oracle.com/errata/ELSA-2008-0549.html", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2016-09-04T11:16:00"}, {"id": "ELSA-2008-0616", "type": "oraclelinux", "title": "thunderbird security update", "description": "[1.5.0.12-14.0.1]\r\n- Add thunderbird-oracle-default-prefs.js for errata rebuild\r\n \n[1.5.0.12-13]\r\n- Respun for mozilla bugs #439035,#439735,#440308\r\n \n[1.5.0.12-12]\r\n- Update patchset to fix regression as per 1.8.1.15", "published": "2008-07-24T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://linux.oracle.com/errata/ELSA-2008-0616.html", "cvelist": ["CVE-2008-2801", "CVE-2008-2785", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2016-09-04T11:17:00"}, {"id": "ELSA-2008-0569", "type": "oraclelinux", "title": "firefox security update", "description": "devhelp:\n[0.12-17]\n- Rebuild against xulrunner\nfirefox:\n[3.0-2.0.1.el5]\n- Replaced the RedHat prefs and bookmarks with Oracle prefs and bookmarks\n- Add patch oracle-firefox-branding.patch\n[3.0-2]\n- Fixed firstrun homepage issue\n[3.0-1]\n- Update to Firefox 3 Final\nxulrunner:\n[1.9-1.0.1.el5]\n- Added xulrunner-oracle-default-prefs.js\n[1.9-1]\n- Update to 1.9 final\nyelp:\n[2.16.0-19]\n- rebuild against xulrunner", "published": "2008-07-02T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://linux.oracle.com/errata/ELSA-2008-0569.html", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2016-09-04T11:16:11"}], "debian": [{"id": "DSA-1607", "type": "debian", "title": "iceweasel -- several vulnerabilities", "description": "Several remote vulnerabilities have been discovered in the Iceweasel webbrowser, an unbranded version of the Firefox browser. The Common Vulnerabilities and Exposures project identifies the following problems:\n\n * [CVE-2008-2798](<https://security-tracker.debian.org/tracker/CVE-2008-2798>)\n\nDevon Hubbard, Jesse Ruderman and Martijn Wargers discovered crashes in the layout engine, which might allow the execution of arbitrary code.\n\n * [CVE-2008-2799](<https://security-tracker.debian.org/tracker/CVE-2008-2799>)\n\nIgor Bukanov, Jesse Ruderman and Gary Kwong discovered crashes in the Javascript engine, which might allow the execution of arbitrary code.\n\n * [CVE-2008-2800](<https://security-tracker.debian.org/tracker/CVE-2008-2800>)\n\n\"moz_bug_r_a4\" discovered several cross-site scripting vulnerabilities.\n\n * [CVE-2008-2801](<https://security-tracker.debian.org/tracker/CVE-2008-2801>)\n\nCollin Jackson and Adam Barth discovered that Javascript code could be executed in the context of signed JAR archives.\n\n * [CVE-2008-2802](<https://security-tracker.debian.org/tracker/CVE-2008-2802>)\n\n\"moz_bug_r_a4\" discovered that XUL documents can escalate privileges by accessing the pre-compiled \"fastload\" file.\n\n * [CVE-2008-2803](<https://security-tracker.debian.org/tracker/CVE-2008-2803>)\n\n\"moz_bug_r_a4\" discovered that missing input sanitising in the mozIJSSubScriptLoader.loadSubScript() function could lead to the execution of arbitrary code. Iceweasel itself is not affected, but some addons are.\n\n * [CVE-2008-2805](<https://security-tracker.debian.org/tracker/CVE-2008-2805>)\n\nClaudio Santambrogio discovered that missing access validation in DOM parsing allows malicious web sites to force the browser to upload local files to the server, which could lead to information disclosure.\n\n * [CVE-2008-2807](<https://security-tracker.debian.org/tracker/CVE-2008-2807>)\n\nDaniel Glazman discovered that a programming error in the code for parsing .properties files could lead to memory content being exposed to addons, which could lead to information disclosure.\n\n * [CVE-2008-2808](<https://security-tracker.debian.org/tracker/CVE-2008-2808>)\n\nMasahiro Yamada discovered that file URLS in directory listings were insufficiently escaped.\n\n * [CVE-2008-2809](<https://security-tracker.debian.org/tracker/CVE-2008-2809>)\n\nJohn G. Myers, Frank Benkstein and Nils Toedtmann discovered that alternate names on self-signed certificates were handled insufficiently, which could lead to spoofings secure connections.\n\n * [CVE-2008-2811](<https://security-tracker.debian.org/tracker/CVE-2008-2811>)\n\nGreg McManus discovered a crash in the block reflow code, which might allow the execution of arbitrary code.\n\nFor the stable distribution (etch), these problems have been fixed in version 2.0.0.15-0etch1.\n\nIceweasel from the unstable distribution (sid) links dynamically against the xulrunner library.\n\nWe recommend that you upgrade your iceweasel package.", "published": "2008-07-11T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://www.debian.org/security/dsa-1607", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2016-09-02T18:26:55"}, {"id": "DSA-1615", "type": "debian", "title": "xulrunner -- several vulnerabilities", "description": "Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications. The Common Vulnerabilities and Exposures project identifies the following problems:\n\n * [CVE-2008-2785](<https://security-tracker.debian.org/tracker/CVE-2008-2785>)\n\nIt was discovered that missing boundary checks on a reference counter for CSS objects can lead to the execution of arbitrary code.\n\n * [CVE-2008-2798](<https://security-tracker.debian.org/tracker/CVE-2008-2798>)\n\nDevon Hubbard, Jesse Ruderman and Martijn Wargers discovered crashes in the layout engine, which might allow the execution of arbitrary code.\n\n * [CVE-2008-2799](<https://security-tracker.debian.org/tracker/CVE-2008-2799>)\n\nIgor Bukanov, Jesse Ruderman and Gary Kwong discovered crashes in the Javascript engine, which might allow the execution of arbitrary code.\n\n * [CVE-2008-2800](<https://security-tracker.debian.org/tracker/CVE-2008-2800>)\n\nmoz_bug_r_a4 discovered several cross-site scripting vulnerabilities.\n\n * [CVE-2008-2801](<https://security-tracker.debian.org/tracker/CVE-2008-2801>)\n\nCollin Jackson and Adam Barth discovered that Javascript code could be executed in the context of signed JAR archives.\n\n * [CVE-2008-2802](<https://security-tracker.debian.org/tracker/CVE-2008-2802>)\n\nmoz_bug_r_a4 discovered that XUL documents can escalate privileges by accessing the pre-compiled fastload file.\n\n * [CVE-2008-2803](<https://security-tracker.debian.org/tracker/CVE-2008-2803>)\n\nmoz_bug_r_a4 discovered that missing input sanitising in the mozIJSSubScriptLoader.loadSubScript() function could lead to the execution of arbitrary code. Iceweasel itself is not affected, but some addons are.\n\n * [CVE-2008-2805](<https://security-tracker.debian.org/tracker/CVE-2008-2805>)\n\nClaudio Santambrogio discovered that missing access validation in DOM parsing allows malicious web sites to force the browser to upload local files to the server, which could lead to information disclosure.\n\n * [CVE-2008-2807](<https://security-tracker.debian.org/tracker/CVE-2008-2807>)\n\nDaniel Glazman discovered that a programming error in the code for parsing .properties files could lead to memory content being exposed to addons, which could lead to information disclosure.\n\n * [CVE-2008-2808](<https://security-tracker.debian.org/tracker/CVE-2008-2808>)\n\nMasahiro Yamada discovered that file URLs in directory listings were insufficiently escaped.\n\n * [CVE-2008-2809](<https://security-tracker.debian.org/tracker/CVE-2008-2809>)\n\nJohn G. Myers, Frank Benkstein and Nils Toedtmann discovered that alternate names on self-signed certificates were handled insufficiently, which could lead to spoofing of secure connections.\n\n * [CVE-2008-2811](<https://security-tracker.debian.org/tracker/CVE-2008-2811>)\n\nGreg McManus discovered a crash in the block reflow code, which might allow the execution of arbitrary code.\n\n * [CVE-2008-2933](<https://security-tracker.debian.org/tracker/CVE-2008-2933>)\n\nBilly Rios discovered that passing an URL containing a pipe symbol to Iceweasel can lead to Chrome privilege escalation.\n\nFor the stable distribution (etch), these problems have been fixed in version 1.8.0.15~pre080614d-0etch1.\n\nFor the unstable distribution (sid), these problems have been fixed in version 1.9.0.1-1.\n\nWe recommend that you upgrade your xulrunner packages.", "published": "2008-07-23T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://www.debian.org/security/dsa-1615", "cvelist": ["CVE-2008-2933", "CVE-2008-2801", "CVE-2008-2785", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2016-09-02T18:32:57"}, {"id": "DSA-1697", "type": "debian", "title": "iceape -- several vulnerabilities", "description": "Several remote vulnerabilities have been discovered in Iceape an unbranded version of the Seamonkey internet suite. The Common Vulnerabilities and Exposures project identifies the following problems:\n\n * [CVE-2008-0016](<https://security-tracker.debian.org/tracker/CVE-2008-0016>)\n\nJustin Schuh, Tom Cross and Peter Williams discovered a buffer overflow in the parser for UTF-8 URLs, which may lead to the execution of arbitrary code. (MFSA 2008-37)\n\n * [CVE-2008-0304](<https://security-tracker.debian.org/tracker/CVE-2008-0304>)\n\nIt was discovered that a buffer overflow in MIME decoding can lead to the execution of arbitrary code. (MFSA 2008-26)\n\n * [CVE-2008-2785](<https://security-tracker.debian.org/tracker/CVE-2008-2785>)\n\nIt was discovered that missing boundary checks on a reference counter for CSS objects can lead to the execution of arbitrary code. (MFSA 2008-34)\n\n * [CVE-2008-2798](<https://security-tracker.debian.org/tracker/CVE-2008-2798>)\n\nDevon Hubbard, Jesse Ruderman and Martijn Wargers discovered crashes in the layout engine, which might allow the execution of arbitrary code. (MFSA 2008-21)\n\n * [CVE-2008-2799](<https://security-tracker.debian.org/tracker/CVE-2008-2799>)\n\nIgor Bukanov, Jesse Ruderman and Gary Kwong discovered crashes in the Javascript engine, which might allow the execution of arbitrary code. (MFSA 2008-21)\n\n * [CVE-2008-2800](<https://security-tracker.debian.org/tracker/CVE-2008-2800>)\n\n\"moz_bug_r_a4\" discovered several cross-site scripting vulnerabilities. (MFSA 2008-22)\n\n * [CVE-2008-2801](<https://security-tracker.debian.org/tracker/CVE-2008-2801>)\n\nCollin Jackson and Adam Barth discovered that Javascript code could be executed in the context or signed JAR archives. (MFSA 2008-23)\n\n * [CVE-2008-2802](<https://security-tracker.debian.org/tracker/CVE-2008-2802>)\n\n\"moz_bug_r_a4\" discovered that XUL documements can escalate privileges by accessing the pre-compiled \"fastload\" file. (MFSA 2008-24)\n\n * [CVE-2008-2803](<https://security-tracker.debian.org/tracker/CVE-2008-2803>)\n\n\"moz_bug_r_a4\" discovered that missing input sanitising in the mozIJSSubScriptLoader.loadSubScript() function could lead to the execution of arbitrary code. Iceape itself is not affected, but some addons are. (MFSA 2008-25)\n\n * [CVE-2008-2805](<https://security-tracker.debian.org/tracker/CVE-2008-2805>)\n\nClaudio Santambrogio discovered that missing access validation in DOM parsing allows malicious web sites to force the browser to upload local files to the server, which could lead to information disclosure. (MFSA 2008-27)\n\n * [CVE-2008-2807](<https://security-tracker.debian.org/tracker/CVE-2008-2807>)\n\nDaniel Glazman discovered that a programming error in the code for parsing .properties files could lead to memory content being exposed to addons, which could lead to information disclosure. (MFSA 2008-29)\n\n * [CVE-2008-2808](<https://security-tracker.debian.org/tracker/CVE-2008-2808>)\n\nMasahiro Yamada discovered that file URLs in directory listings were insufficiently escaped. (MFSA 2008-30)\n\n * [CVE-2008-2809](<https://security-tracker.debian.org/tracker/CVE-2008-2809>)\n\nJohn G. Myers, Frank Benkstein and Nils Toedtmann discovered that alternate names on self-signed certificates were handled insufficiently, which could lead to spoofings of secure connections. (MFSA 2008-31)\n\n * [CVE-2008-2810](<https://security-tracker.debian.org/tracker/CVE-2008-2810>)\n\nIt was discovered that URL shortcut files could be used to bypass the same-origin restrictions. This issue does not affect current Iceape, but might occur with additional extensions installed. (MFSA 2008-32)\n\n * [CVE-2008-2811](<https://security-tracker.debian.org/tracker/CVE-2008-2811>)\n\nGreg McManus discovered a crash in the block reflow code, which might allow the execution of arbitrary code. (MFSA 2008-33)\n\n * [CVE-2008-2933](<https://security-tracker.debian.org/tracker/CVE-2008-2933>)\n\nBilly Rios discovered that passing an URL containing a pipe symbol to Iceape can lead to Chrome privilege escalation. (MFSA 2008-35)\n\n * [CVE-2008-3835](<https://security-tracker.debian.org/tracker/CVE-2008-3835>)\n\n\"moz_bug_r_a4\" discovered that the same-origin check in nsXMLDocument::OnChannelRedirect() could be bypassed. (MFSA 2008-38)\n\n * [CVE-2008-3836](<https://security-tracker.debian.org/tracker/CVE-2008-3836>)\n\n\"moz_bug_r_a4\" discovered that several vulnerabilities in feedWriter could lead to Chrome privilege escalation. (MFSA 2008-39)\n\n * [CVE-2008-3837](<https://security-tracker.debian.org/tracker/CVE-2008-3837>)\n\nPaul Nickerson discovered that an attacker could move windows during a mouse click, resulting in unwanted action triggered by drag-and-drop. (MFSA 2008-40)\n\n * [CVE-2008-4058](<https://security-tracker.debian.org/tracker/CVE-2008-4058>)\n\n\"moz_bug_r_a4\" discovered a vulnerability which can result in Chrome privilege escalation through XPCNativeWrappers. (MFSA 2008-41)\n\n * [CVE-2008-4059](<https://security-tracker.debian.org/tracker/CVE-2008-4059>)\n\n\"moz_bug_r_a4\" discovered a vulnerability which can result in Chrome privilege escalation through XPCNativeWrappers. (MFSA 2008-41)\n\n * [CVE-2008-4060](<https://security-tracker.debian.org/tracker/CVE-2008-4060>)\n\nOlli Pettay and \"moz_bug_r_a4\" discovered a Chrome privilege escalation vulnerability in XSLT handling. (MFSA 2008-41)\n\n * [CVE-2008-4061](<https://security-tracker.debian.org/tracker/CVE-2008-4061>)\n\nJesse Ruderman discovered a crash in the layout engine, which might allow the execution of arbitrary code. (MFSA 2008-42)\n\n * [CVE-2008-4062](<https://security-tracker.debian.org/tracker/CVE-2008-4062>)\n\nIgor Bukanov, Philip Taylor, Georgi Guninski and Antoine Labour discovered crashes in the Javascript engine, which might allow the execution of arbitrary code. (MFSA 2008-42)\n\n * [CVE-2008-4065](<https://security-tracker.debian.org/tracker/CVE-2008-4065>)\n\nDave Reed discovered that some Unicode byte order marks are stripped from Javascript code before execution, which can result in code being executed, which were otherwise part of a quoted string. (MFSA 2008-43)\n\n * [CVE-2008-4067](<https://security-tracker.debian.org/tracker/CVE-2008-4067>)\n\nBoris Zbarsky discovered that resource: URLs allow directory traversal when using URL-encoded slashes. (MFSA 2008-44)\n\n * [CVE-2008-4068](<https://security-tracker.debian.org/tracker/CVE-2008-4068>)\n\nGeorgi Guninski discovered that resource: URLs could bypass local access restrictions. (MFSA 2008-44)\n\n * [CVE-2008-4069](<https://security-tracker.debian.org/tracker/CVE-2008-4069>)\n\nBilly Hoffman discovered that the XBM decoder could reveal uninitialised memory. (MFSA 2008-45)\n\n * [CVE-2008-4070](<https://security-tracker.debian.org/tracker/CVE-2008-4070>)\n\nIt was discovered that a buffer overflow could be triggered via a long header in a news article, which could lead to arbitrary code execution. (MFSA 2008-46)\n\n * [CVE-2008-5012](<https://security-tracker.debian.org/tracker/CVE-2008-5012>)\n\nGeorgi Guninski, Michal Zalewski and Chris Evan discovered that the canvas element could be used to bypass same-origin restrictions. (MFSA 2008-48)\n\n * [CVE-2008-5013](<https://security-tracker.debian.org/tracker/CVE-2008-5013>)\n\nIt was discovered that insufficient checks in the Flash plugin glue code could lead to arbitrary code execution. (MFSA 2008-49)\n\n * [CVE-2008-5014](<https://security-tracker.debian.org/tracker/CVE-2008-5014>)\n\nJesse Ruderman discovered that a programming error in the window.__proto__.__proto__ object could lead to arbitrary code execution. (MFSA 2008-50)\n\n * [CVE-2008-5017](<https://security-tracker.debian.org/tracker/CVE-2008-5017>)\n\nIt was discovered that crashes in the layout engine could lead to arbitrary code execution. (MFSA 2008-52)\n\n * [CVE-2008-0017](<https://security-tracker.debian.org/tracker/CVE-2008-0017>)\n\nJustin Schuh discovered that a buffer overflow in http-index-format parser could lead to arbitrary code execution. (MFSA 2008-54)\n\n * [CVE-2008-5021](<https://security-tracker.debian.org/tracker/CVE-2008-5021>)\n\nIt was discovered that a crash in the nsFrameManager might lead to the execution of arbitrary code. (MFSA 2008-55)\n\n * [CVE-2008-5022](<https://security-tracker.debian.org/tracker/CVE-2008-5022>)\n\n\"moz_bug_r_a4\" discovered that the same-origin check in nsXMLHttpRequest::NotifyEventListeners() could be bypassed. (MFSA 2008-56)\n\n * [CVE-2008-5024](<https://security-tracker.debian.org/tracker/CVE-2008-5024>)\n\nChris Evans discovered that quote characters were improperly escaped in the default namespace of E4X documents. (MFSA 2008-58)\n\n * [CVE-2008-4582](<https://security-tracker.debian.org/tracker/CVE-2008-4582>)\n\nLiu Die Yu discovered an information leak through local shortcut files. (MFSA 2008-59)\n\n * [CVE-2008-5500](<https://security-tracker.debian.org/tracker/CVE-2008-5500>)\n\nJesse Ruderman discovered that the layout engine is vulnerable to DoS attacks that might trigger memory corruption and an integer overflow. (MFSA 2008-60)\n\n * [CVE-2008-5503](<https://security-tracker.debian.org/tracker/CVE-2008-5503>)\n\nBoris Zbarsky discovered that an information disclosure attack could be performed via XBL bindings. (MFSA 2008-61)\n\n * [CVE-2008-5506](<https://security-tracker.debian.org/tracker/CVE-2008-5506>)\n\nMarius Schilder discovered that it is possible to obtain sensible data via a XMLHttpRequest. (MFSA 2008-64)\n\n * [CVE-2008-5507](<https://security-tracker.debian.org/tracker/CVE-2008-5507>)\n\nChris Evans discovered that it is possible to obtain sensible data via a JavaScript URL. (MFSA 2008-65)\n\n * [CVE-2008-5508](<https://security-tracker.debian.org/tracker/CVE-2008-5508>)\n\nChip Salzenberg discovered possible phishing attacks via URLs with leading whitespaces or control characters. (MFSA 2008-66)\n\n * [CVE-2008-5511](<https://security-tracker.debian.org/tracker/CVE-2008-5511>)\n\nIt was discovered that it is possible to perform cross-site scripting attacks via an XBL binding to an \"unloaded document.\" (MFSA 2008-68)\n\n * [CVE-2008-5512](<https://security-tracker.debian.org/tracker/CVE-2008-5512>)\n\nIt was discovered that it is possible to run arbitrary JavaScript with chrome privileges via unknown vectors. (MFSA 2008-68)\n\nFor the stable distribution (etch) these problems have been fixed in version 1.0.13~pre080614i-0etch1.\n\nFor the upcoming stable distribution (lenny) these problems will be fixed soon.\n\nFor the unstable (sid) distribution these problems have been fixed in version 1.1.14-1.\n\nWe recommend that you upgrade your iceape packages.", "published": "2009-01-07T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://www.debian.org/security/dsa-1697", "cvelist": ["CVE-2008-2933", "CVE-2008-2801", "CVE-2008-3835", "CVE-2008-2785", "CVE-2008-2799", "CVE-2008-5500", "CVE-2008-4070", "CVE-2008-4067", "CVE-2008-5012", "CVE-2008-5013", "CVE-2008-3836", "CVE-2008-4069", "CVE-2008-0016", "CVE-2008-2803", "CVE-2008-4059", "CVE-2008-0304", "CVE-2008-2807", "CVE-2008-3837", "CVE-2008-5021", "CVE-2008-5017", "CVE-2008-4062", "CVE-2008-4060", "CVE-2008-5014", "CVE-2008-4058", "CVE-2008-5022", "CVE-2008-5512", "CVE-2008-4068", "CVE-2008-5503", "CVE-2008-2810", "CVE-2008-5511", "CVE-2008-2805", "CVE-2008-5508", "CVE-2008-4061", "CVE-2008-2808", "CVE-2008-0017", "CVE-2008-5024", "CVE-2008-5507", "CVE-2008-4065", "CVE-2008-2800", "CVE-2008-4582", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-5506", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2016-09-02T18:26:41"}, {"id": "DSA-1621", "type": "debian", "title": "icedove -- several vulnerabilities", "description": "Several remote vulnerabilities have been discovered in the Icedove mail client, an unbranded version of the Thunderbird client. The Common Vulnerabilities and Exposures project identifies the following problems: \n\n * [CVE-2008-0304](<https://security-tracker.debian.org/tracker/CVE-2008-0304>)\n\nIt was discovered that a buffer overflow in MIME decoding can lead to the execution of arbitrary code. \n\n * [CVE-2008-2785](<https://security-tracker.debian.org/tracker/CVE-2008-2785>)\n\nIt was discovered that missing boundary checks on a reference counter for CSS objects can lead to the execution of arbitrary code. \n\n * [CVE-2008-2798](<https://security-tracker.debian.org/tracker/CVE-2008-2798>)\n\nDevon Hubbard, Jesse Ruderman and Martijn Wargers discovered crashes in the layout engine, which might allow the execution of arbitrary code. \n\n * [CVE-2008-2799](<https://security-tracker.debian.org/tracker/CVE-2008-2799>)\n\nIgor Bukanov, Jesse Ruderman and Gary Kwong discovered crashes in the Javascript engine, which might allow the execution of arbitrary code. \n\n * [CVE-2008-2802](<https://security-tracker.debian.org/tracker/CVE-2008-2802>)\n\n\"moz_bug_r_a4\" discovered that XUL documents can escalate privileges by accessing the pre-compiled \"fastload\" file. \n\n * [CVE-2008-2803](<https://security-tracker.debian.org/tracker/CVE-2008-2803>)\n\n\"moz_bug_r_a4\" discovered that missing input sanitising in the mozIJSSubScriptLoader.loadSubScript() function could lead to the execution of arbitrary code. Iceweasel itself is not affected, but some addons are. \n\n * [CVE-2008-2807](<https://security-tracker.debian.org/tracker/CVE-2008-2807>)\n\nDaniel Glazman discovered that a programming error in the code for parsing .properties files could lead to memory content being exposed to addons, which could lead to information disclosure. \n\n * [CVE-2008-2809](<https://security-tracker.debian.org/tracker/CVE-2008-2809>)\n\nJohn G. Myers, Frank Benkstein and Nils Toedtmann discovered that alternate names on self-signed certificates were handled insufficiently, which could lead to spoofings secure connections. \n\n * [CVE-2008-2811](<https://security-tracker.debian.org/tracker/CVE-2008-2811>)\n\nGreg McManus discovered discovered a crash in the block reflow code, which might allow the execution of arbitrary code. \n\nFor the stable distribution (etch), these problems have been fixed in version 1.5.0.13+1.5.0.15b.dfsg1+prepatch080614d-0etch1. Packages for s390 are not yet available and will be provided later. \n\nFor the unstable distribution (sid), these problems have been fixed in version 2.0.0.16-1. \n\nWe recommend that you upgrade your icedove package.", "published": "2008-07-27T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://www.debian.org/security/dsa-1621", "cvelist": ["CVE-2008-2785", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-0304", "CVE-2008-2807", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2016-09-02T18:21:40"}], "suse": [{"id": "SUSE-SA:2008:034", "type": "suse", "title": "remote code execution in MozillaFirefox", "description": "Mozilla Firefox was updated to version 2.0.0.15, fixing various bugs including following security bugs.\n#### Solution\nThere is no known workaround, please install the update packages.", "published": "2008-07-11T13:26:28", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798", "CVE-2008-2806"], "lastseen": "2016-09-04T11:45:49"}], "ubuntu": [{"id": "USN-619-1", "type": "ubuntu", "title": "Firefox vulnerabilities", "description": "Various flaws were discovered in the browser engine. By tricking a user into opening a malicious web page, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2008-2798, CVE-2008-2799)\n\nSeveral problems were discovered in the JavaScript engine. If a user were tricked into opening a malicious web page, an attacker could perform cross-site scripting attacks. (CVE-2008-2800)\n\nCollin Jackson discovered various flaws in the JavaScript engine which allowed JavaScript to be injected into signed JAR files. If a user were tricked into opening malicious web content, an attacker may be able to execute arbitrary code with the privileges of a different website or link content within the JAR file to an attacker-controlled JavaScript file. (CVE-2008-2801)\n\nIt was discovered that Firefox would allow non-privileged XUL documents to load chrome scripts from the fastload file. This could allow an attacker to execute arbitrary JavaScript code with chrome privileges. (CVE-2008-2802)\n\nA flaw was discovered in Firefox that allowed overwriting trusted objects via mozIJSSubScriptLoader.loadSubScript(). If a user were tricked into opening a malicious web page, an attacker could execute arbitrary code with the privileges of the user invoking the program. (CVE-2008-2803)\n\nClaudio Santambrogio discovered a vulnerability in Firefox which could lead to stealing of arbitrary files. If a user were tricked into opening malicious content, an attacker could force the browser into uploading local files to the remote server. (CVE-2008-2805)\n\nGregory Fleischer discovered a flaw in Java LiveConnect. An attacker could exploit this to bypass the same-origin policy and create arbitrary socket connections to other domains. (CVE-2008-2806)\n\nDaniel Glazman found that an improperly encoded .properties file in an add-on can result in uninitialized memory being used. If a user were tricked into installing a malicious add-on, the browser may be able to see data from other programs. (CVE-2008-2807)\n\nMasahiro Yamada discovered that Firefox did not properly sanitize file URLs in directory listings, resulting in files from directory listings being opened in unintended ways or not being able to be opened by the browser at all. (CVE-2008-2808)\n\nJohn G. Myers discovered a weakness in the trust model used by Firefox regarding alternate names on self-signed certificates. If a user were tricked into accepting a certificate containing alternate name entries, an attacker could impersonate another server. (CVE-2008-2809)\n\nA flaw was discovered in the way Firefox opened URL files. If a user were tricked into opening a bookmark to a malicious web page, the page could potentially read from local files on the user\u2019s computer. (CVE-2008-2810)\n\nA vulnerability was discovered in the block reflow code of Firefox. This vulnerability could be used by an attacker to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking the program. (CVE-2008-2811)", "published": "2008-07-02T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://usn.ubuntu.com/619-1/", "cvelist": ["CVE-2008-2801", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798", "CVE-2008-2806"], "lastseen": "2018-03-29T18:20:49"}, {"id": "USN-629-1", "type": "ubuntu", "title": "Thunderbird vulnerabilities", "description": "Various flaws were discovered in the browser engine. If a user had Javascript enabled and were tricked into opening a malicious web page, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2008-2798, CVE-2008-2799)\n\nIt was discovered that Thunderbird would allow non-privileged XUL documents to load chrome scripts from the fastload file if Javascript was enabled. This could allow an attacker to execute arbitrary Javascript code with chrome privileges. (CVE-2008-2802)\n\nA flaw was discovered in Thunderbird that allowed overwriting trusted objects via mozIJSSubScriptLoader.loadSubScript(). If a user had Javascript enabled and was tricked into opening a malicious web page, an attacker could execute arbitrary code with the privileges of the user invoking the program. (CVE-2008-2803)\n\nDaniel Glazman found that an improperly encoded .properties file in an add-on can result in uninitialized memory being used. If a user were tricked into installing a malicious add-on, Thunderbird may be able to see data from other programs. (CVE-2008-2807)\n\nJohn G. Myers discovered a weakness in the trust model used by Thunderbird regarding alternate names on self-signed certificates. If a user were tricked into accepting a certificate containing alternate name entries, an attacker could impersonate another server. (CVE-2008-2809)\n\nA vulnerability was discovered in the block reflow code of Thunderbird. If a user enabled Javascript, this vulnerability could be used by an attacker to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking the program. (CVE-2008-2811)\n\nA flaw was discovered in the browser engine. A variable could be made to overflow causing Thunderbird to crash. If a user enable Javascript and was tricked into opening a malicious web page, an attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2008-2785)\n\nMozilla developers audited the MIME handling code looking for similar vulnerabilities to the previously fixed CVE-2008-0304, and changed several function calls to use safer versions of string routines.", "published": "2008-07-25T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://usn.ubuntu.com/629-1/", "cvelist": ["CVE-2008-2785", "CVE-2008-2799", "CVE-2008-2803", "CVE-2008-0304", "CVE-2008-2807", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2018-03-29T18:19:35"}], "gentoo": [{"id": "GLSA-200808-03", "type": "gentoo", "title": "Mozilla products: Multiple vulnerabilities", "description": "### Background\n\nMozilla Firefox is an open-source web browser and Mozilla Thunderbird an open-source email client, both from the Mozilla Project. The SeaMonkey project is a community effort to deliver production-quality releases of code derived from the application formerly known as the 'Mozilla Application Suite'. XULRunner is a Mozilla runtime package that can be used to bootstrap XUL+XPCOM applications like Firefox and Thunderbird. \n\n### Description\n\nThe following vulnerabilities were reported in all mentioned Mozilla products: \n\n * TippingPoint's Zero Day Initiative reported that an incorrect integer data type is used as a CSS object reference counter, leading to a counter overflow and a free() of in-use memory (CVE-2008-2785). \n * Igor Bukanov, Jesse Ruderman and Gary Kwong reported crashes in the JavaScript engine, possibly triggering memory corruption (CVE-2008-2799). \n * Devon Hubbard, Jesse Ruderman, and Martijn Wargers reported crashes in the layout engine, possibly triggering memory corruption (CVE-2008-2798). \n * moz_bug_r_a4 reported that XUL documents that include a script from a chrome: URI that points to a fastload file would be executed with the privileges specified in the file (CVE-2008-2802). \n * moz_bug_r_a4 reported that the mozIJSSubScriptLoader.LoadScript() function only apply XPCNativeWrappers to scripts loaded from standard \"chrome:\" URIs, which could be the case in third-party add-ons (CVE-2008-2803). \n * Astabis reported a crash in the block reflow implementation related to large images (CVE-2008-2811). \n * John G. Myers, Frank Benkstein and Nils Toedtmann reported a weakness in the trust model used by Mozilla, that when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, the certificate is also regarded as accepted for all domain names in subjectAltName:dNSName fields (CVE-2008-2809). \n\nThe following vulnerabilities were reported in Firefox, SeaMonkey and XULRunner: \n\n * moz_bug_r_a4 reported that the Same Origin Policy is not properly enforced on JavaScript (CVE-2008-2800). \n * Collin Jackson and Adam Barth reported that JAR signing is not properly implemented, allowing injection of JavaScript into documents within a JAR archive (CVE-2008-2801). \n * Opera Software reported an error allowing for arbitrary local file upload (CVE-2008-2805). \n * Daniel Glazman reported that an invalid .properties file for an add-on might lead to the usage of uninitialized memory (CVE-2008-2807). \n * Masahiro Yamada reported that HTML in \"file://\" URLs in directory listings is not properly escaped (CVE-2008-2808). \n * Geoff reported that the context of Windows Internet shortcut files is not correctly identified (CVE-2008-2810). \n * The crash vulnerability (CVE-2008-1380) that was previously announced in GLSA 200805-18 is now also also resolved in Seamonkey binary ebuilds. \n\nThe following vulnerability was reported in Firefox only: \n\n * Billy Rios reported that the Pipe character in a command-line URI is identified as a request to open multiple tabs, allowing to open \"chrome\" and \"file\" URIs (CVE-2008-2933). \n\n### Impact\n\nA remote attacker could entice a user to view a specially crafted web page or email that will trigger one of the vulnerabilities, possibly leading to the execution of arbitrary code or a Denial of Service. It is also possible for an attacker to trick a user to upload arbitrary files or to accept an invalid certificate for a spoofed web site, to read uninitialized memory, to violate Same Origin Policy, or to conduct Cross-Site Scripting attacks. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll Mozilla Firefox users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/mozilla-firefox-2.0.0.16\"\n\nAll Mozilla Firefox binary users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/mozilla-firefox-bin-2.0.0.16\"\n\nAll Mozilla Thunderbird users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=mail-client/mozilla-thunderbird-2.0.0.16\"\n\nAll Mozilla Thunderbird binary users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=mail-client/mozilla-thunderbird-bin-2.0.0.16\"\n\nAll Seamonkey users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/seamonkey-1.1.11\"\n\nAll Seamonkey binary users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-client/seamonkey-bin-1.1.11\"\n\nAll XULRunner users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=net-libs/xulrunner-1.8.1.16\"\n\nAll XULRunner binary users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=net-libs/xulrunner-bin-1.8.1.16\"", "published": "2008-08-06T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://security.gentoo.org/glsa/200808-03", "cvelist": ["CVE-2008-2933", "CVE-2008-2801", "CVE-2008-2785", "CVE-2008-2799", "CVE-2008-1380", "CVE-2008-2803", "CVE-2008-2807", "CVE-2008-2810", "CVE-2008-2805", "CVE-2008-2808", "CVE-2008-2800", "CVE-2008-2802", "CVE-2008-2809", "CVE-2008-2811", "CVE-2008-2798"], "lastseen": "2016-09-06T19:46:53"}], "canvas": [{"id": "FIREFOX_DEFINESETTER", "type": "canvas", "title": "Immunity Canvas: FIREFOX_DEFINESETTER", "description": "**Name**| firefox_definesetter \n---|--- \n**CVE**| CVE-2008-2798 \n**Exploit Pack**| [CANVAS](<http://http://www.immunityinc.com/products-canvas.shtml>) \n**Description**| Firefox <= 2.0.0.14 Javascript defineSetter Memory Corruption \n**Notes**| CVE Name: CVE-2008-2798 \nVENDOR: Mozilla \nRepeatability: Infinite (client side - crash the browser) \nCVS URL: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2798 \nDate public: 07/01/2008 \nCVSS: 10.0 \n\n", "published": "2008-07-07T19:41:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://exploitlist.immunityinc.com/home/exploitpack/CANVAS/firefox_definesetter", "cvelist": ["CVE-2008-2798"], "lastseen": "2016-09-25T14:14:21"}]}}