CVE-2005-1160

The privileged "chrome" UI code in Firefox before 1.0.3 and Mozilla Suite before 1.7.7 allows remote attackers to gain privileges by overriding certain properties or methods of DOM nodes, as demonstrated using multiple attacks involving the eval function or the Script object.
References
Link Resource
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt
http://secunia.com/advisories/14938 Patch Vendor Advisory
http://secunia.com/advisories/14992 Patch Vendor Advisory
http://secunia.com/advisories/19823
http://www.gentoo.org/security/en/glsa/glsa-200504-18.xml Patch Vendor Advisory
http://www.mozilla.org/security/announce/mfsa2005-41.html Vendor Advisory
http://www.novell.com/linux/security/advisories/2006_04_25.html
http://www.redhat.com/support/errata/RHSA-2005-383.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-384.html
http://www.redhat.com/support/errata/RHSA-2005-386.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-601.html
http://www.securityfocus.com/bid/13233
http://www.securityfocus.com/bid/15495
https://bugzilla.mozilla.org/show_bug.cgi?id=289074 Patch
https://bugzilla.mozilla.org/show_bug.cgi?id=289083 Patch
https://bugzilla.mozilla.org/show_bug.cgi?id=289961 Patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100017
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11291
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt
http://secunia.com/advisories/14938 Patch Vendor Advisory
http://secunia.com/advisories/14992 Patch Vendor Advisory
http://secunia.com/advisories/19823
http://www.gentoo.org/security/en/glsa/glsa-200504-18.xml Patch Vendor Advisory
http://www.mozilla.org/security/announce/mfsa2005-41.html Vendor Advisory
http://www.novell.com/linux/security/advisories/2006_04_25.html
http://www.redhat.com/support/errata/RHSA-2005-383.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-384.html
http://www.redhat.com/support/errata/RHSA-2005-386.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-601.html
http://www.securityfocus.com/bid/13233
http://www.securityfocus.com/bid/15495
https://bugzilla.mozilla.org/show_bug.cgi?id=289074 Patch
https://bugzilla.mozilla.org/show_bug.cgi?id=289083 Patch
https://bugzilla.mozilla.org/show_bug.cgi?id=289961 Patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100017
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11291
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.5:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.5:rc1:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.5:rc2:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.6:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.6:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:rc1:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:rc2:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:rc3:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.6:*:*:*:*:*:*:*

History

20 Nov 2024, 23:56

Type Values Removed Values Added
References () ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt - () ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt -
References () http://secunia.com/advisories/14938 - Patch, Vendor Advisory () http://secunia.com/advisories/14938 - Patch, Vendor Advisory
References () http://secunia.com/advisories/14992 - Patch, Vendor Advisory () http://secunia.com/advisories/14992 - Patch, Vendor Advisory
References () http://secunia.com/advisories/19823 - () http://secunia.com/advisories/19823 -
References () http://www.gentoo.org/security/en/glsa/glsa-200504-18.xml - Patch, Vendor Advisory () http://www.gentoo.org/security/en/glsa/glsa-200504-18.xml - Patch, Vendor Advisory
References () http://www.mozilla.org/security/announce/mfsa2005-41.html - Vendor Advisory () http://www.mozilla.org/security/announce/mfsa2005-41.html - Vendor Advisory
References () http://www.novell.com/linux/security/advisories/2006_04_25.html - () http://www.novell.com/linux/security/advisories/2006_04_25.html -
References () http://www.redhat.com/support/errata/RHSA-2005-383.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2005-383.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2005-384.html - () http://www.redhat.com/support/errata/RHSA-2005-384.html -
References () http://www.redhat.com/support/errata/RHSA-2005-386.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2005-386.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2005-601.html - () http://www.redhat.com/support/errata/RHSA-2005-601.html -
References () http://www.securityfocus.com/bid/13233 - () http://www.securityfocus.com/bid/13233 -
References () http://www.securityfocus.com/bid/15495 - () http://www.securityfocus.com/bid/15495 -
References () https://bugzilla.mozilla.org/show_bug.cgi?id=289074 - Patch () https://bugzilla.mozilla.org/show_bug.cgi?id=289074 - Patch
References () https://bugzilla.mozilla.org/show_bug.cgi?id=289083 - Patch () https://bugzilla.mozilla.org/show_bug.cgi?id=289083 - Patch
References () https://bugzilla.mozilla.org/show_bug.cgi?id=289961 - Patch () https://bugzilla.mozilla.org/show_bug.cgi?id=289961 - Patch
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100017 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100017 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11291 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11291 -

Information

Published : 2005-05-02 04:00

Updated : 2024-11-20 23:56


NVD link : CVE-2005-1160

Mitre link : CVE-2005-1160

CVE.ORG link : CVE-2005-1160


JSON object : View

Products Affected

mozilla

  • mozilla
  • firefox