The Script.prototype.freeze/thaw functionality in Mozilla 1.4 and earlier allows attackers to execute native methods by modifying the string used as input to the script.thaw JavaScript function, which is then deserialized and executed.
References
Link | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=221526 | Patch Vendor Advisory |
http://secunia.com/advisories/11103/ | Patch Vendor Advisory |
http://www.securityfocus.com/advisories/6979 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/9322 | Patch Vendor Advisory |
http://www.osvdb.org/8390 | Patch Vendor Advisory |
http://www.mandriva.com/security/advisories?name=MDKSA-2004:021 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2003-10-06 21:00
Updated : 2008-09-10 12:20
NVD link : CVE-2003-0791
Mitre link : CVE-2003-0791
JSON object : View
CWE
Products Affected
sco
- openserver
mozilla
- mozilla