CVE-2007-0994

A regression error in Mozilla Firefox 2.x before 2.0.0.2 and 1.x before 1.5.0.10, and SeaMonkey 1.1 before 1.1.1 and 1.0 before 1.0.8, allows remote attackers to execute arbitrary JavaScript as the user via an HTML mail message with a javascript: URI in an (1) img, (2) link, or (3) style tag, which bypasses the access checks and executes code with chrome privileges.
References
Link Resource
http://www.redhat.com/support/errata/RHSA-2007-0078.html Third Party Advisory
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=230733 Exploit Patch Issue Tracking Third Party Advisory
https://issues.rpath.com/browse/RPL-1103 Broken Link
http://www.mozilla.org/security/announce/2007/mfsa2007-09.html Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2007-0097.html Third Party Advisory
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html Broken Link
http://www.securityfocus.com/bid/22826 Third Party Advisory VDB Entry
http://securitytracker.com/id?1017726 Third Party Advisory VDB Entry
http://secunia.com/advisories/24395 Third Party Advisory
http://secunia.com/advisories/24384 Third Party Advisory
ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc Broken Link
http://secunia.com/advisories/24650 Third Party Advisory
http://www.debian.org/security/2007/dsa-1336 Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851 Mailing List Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131 Mailing List Third Party Advisory
http://www.novell.com/linux/security/advisories/2007_22_mozilla.html Broken Link
http://secunia.com/advisories/24455 Third Party Advisory
http://secunia.com/advisories/24457 Third Party Advisory
http://secunia.com/advisories/25588 Third Party Advisory
ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc Broken Link
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 Broken Link
http://www.vupen.com/english/advisories/2007/0823 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9749 Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*

Information

Published : 2007-03-05 16:19

Updated : 2019-10-09 15:52


NVD link : CVE-2007-0994

Mitre link : CVE-2007-0994


JSON object : View

CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

Advertisement

dedicated server usa

Products Affected

mozilla

  • firefox
  • seamonkey

debian

  • debian_linux