CVE-2005-2261

Firefox before 1.0.5, Thunderbird before 1.0.5, Mozilla before 1.7.9, Netscape 8.0.2, and K-Meleon 0.9 runs XBL scripts even when Javascript has been disabled, which makes it easier for remote attackers to bypass such protection.
References
Link Resource
http://secunia.com/advisories/16043
http://secunia.com/advisories/16044
http://secunia.com/advisories/16059
http://secunia.com/advisories/19823
http://www.ciac.org/ciac/bulletins/p-252.shtml
http://www.debian.org/security/2005/dsa-810
http://www.mozilla.org/security/announce/mfsa2005-46.html Patch Vendor Advisory
http://www.networksecurity.fi/advisories/netscape-multiple-issues.html
http://www.novell.com/linux/security/advisories/2005_18_sr.html
http://www.novell.com/linux/security/advisories/2005_45_mozilla.html
http://www.novell.com/linux/security/advisories/2006_04_25.html
http://www.redhat.com/support/errata/RHSA-2005-586.html
http://www.redhat.com/support/errata/RHSA-2005-587.html
http://www.redhat.com/support/errata/RHSA-2005-601.html
http://www.securityfocus.com/bid/14242
http://www.vupen.com/english/advisories/2005/1075
https://bugzilla.mozilla.org/show_bug.cgi?id=292589 Exploit Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=292591 Exploit Vendor Advisory
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100012
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10947
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1348
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A808
http://secunia.com/advisories/16043
http://secunia.com/advisories/16044
http://secunia.com/advisories/16059
http://secunia.com/advisories/19823
http://www.ciac.org/ciac/bulletins/p-252.shtml
http://www.debian.org/security/2005/dsa-810
http://www.mozilla.org/security/announce/mfsa2005-46.html Patch Vendor Advisory
http://www.networksecurity.fi/advisories/netscape-multiple-issues.html
http://www.novell.com/linux/security/advisories/2005_18_sr.html
http://www.novell.com/linux/security/advisories/2005_45_mozilla.html
http://www.novell.com/linux/security/advisories/2006_04_25.html
http://www.redhat.com/support/errata/RHSA-2005-586.html
http://www.redhat.com/support/errata/RHSA-2005-587.html
http://www.redhat.com/support/errata/RHSA-2005-601.html
http://www.securityfocus.com/bid/14242
http://www.vupen.com/english/advisories/2005/1075
https://bugzilla.mozilla.org/show_bug.cgi?id=292589 Exploit Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=292591 Exploit Vendor Advisory
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100012
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10947
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1348
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A808
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.5:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.5:rc1:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.5:rc2:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.6:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.6:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:rc1:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:rc2:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:rc3:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*

History

20 Nov 2024, 23:59

Type Values Removed Values Added
References () http://secunia.com/advisories/16043 - () http://secunia.com/advisories/16043 -
References () http://secunia.com/advisories/16044 - () http://secunia.com/advisories/16044 -
References () http://secunia.com/advisories/16059 - () http://secunia.com/advisories/16059 -
References () http://secunia.com/advisories/19823 - () http://secunia.com/advisories/19823 -
References () http://www.ciac.org/ciac/bulletins/p-252.shtml - () http://www.ciac.org/ciac/bulletins/p-252.shtml -
References () http://www.debian.org/security/2005/dsa-810 - () http://www.debian.org/security/2005/dsa-810 -
References () http://www.mozilla.org/security/announce/mfsa2005-46.html - Patch, Vendor Advisory () http://www.mozilla.org/security/announce/mfsa2005-46.html - Patch, Vendor Advisory
References () http://www.networksecurity.fi/advisories/netscape-multiple-issues.html - () http://www.networksecurity.fi/advisories/netscape-multiple-issues.html -
References () http://www.novell.com/linux/security/advisories/2005_18_sr.html - () http://www.novell.com/linux/security/advisories/2005_18_sr.html -
References () http://www.novell.com/linux/security/advisories/2005_45_mozilla.html - () http://www.novell.com/linux/security/advisories/2005_45_mozilla.html -
References () http://www.novell.com/linux/security/advisories/2006_04_25.html - () http://www.novell.com/linux/security/advisories/2006_04_25.html -
References () http://www.redhat.com/support/errata/RHSA-2005-586.html - () http://www.redhat.com/support/errata/RHSA-2005-586.html -
References () http://www.redhat.com/support/errata/RHSA-2005-587.html - () http://www.redhat.com/support/errata/RHSA-2005-587.html -
References () http://www.redhat.com/support/errata/RHSA-2005-601.html - () http://www.redhat.com/support/errata/RHSA-2005-601.html -
References () http://www.securityfocus.com/bid/14242 - () http://www.securityfocus.com/bid/14242 -
References () http://www.vupen.com/english/advisories/2005/1075 - () http://www.vupen.com/english/advisories/2005/1075 -
References () https://bugzilla.mozilla.org/show_bug.cgi?id=292589 - Exploit, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=292589 - Exploit, Vendor Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=292591 - Exploit, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=292591 - Exploit, Vendor Advisory
References () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 - () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100012 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100012 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10947 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10947 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1348 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1348 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A808 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A808 -

Information

Published : 2005-07-13 04:00

Updated : 2024-11-20 23:59


NVD link : CVE-2005-2261

Mitre link : CVE-2005-2261

CVE.ORG link : CVE-2005-2261


JSON object : View

Products Affected

mozilla

  • firefox
  • mozilla
  • thunderbird