CVE-2008-1233

Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via "XPCNativeWrapper pollution."
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html
http://rhn.redhat.com/errata/RHSA-2008-0208.html
http://secunia.com/advisories/29391 Vendor Advisory
http://secunia.com/advisories/29526
http://secunia.com/advisories/29539
http://secunia.com/advisories/29541
http://secunia.com/advisories/29547
http://secunia.com/advisories/29548
http://secunia.com/advisories/29550
http://secunia.com/advisories/29558
http://secunia.com/advisories/29560 Vendor Advisory
http://secunia.com/advisories/29607
http://secunia.com/advisories/29616
http://secunia.com/advisories/29645
http://secunia.com/advisories/30016
http://secunia.com/advisories/30094
http://secunia.com/advisories/30105
http://secunia.com/advisories/30192
http://secunia.com/advisories/30327
http://secunia.com/advisories/30370
http://secunia.com/advisories/30620
http://secunia.com/advisories/31043
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128
http://www.debian.org/security/2008/dsa-1532
http://www.debian.org/security/2008/dsa-1534
http://www.debian.org/security/2008/dsa-1535
http://www.debian.org/security/2008/dsa-1574
http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml
http://www.kb.cert.org/vuls/id/466521 US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2008:080
http://www.mandriva.com/security/advisories?name=MDVSA-2008:155
http://www.mozilla.org/security/announce/2008/mfsa2008-14.html
http://www.redhat.com/support/errata/RHSA-2008-0207.html
http://www.redhat.com/support/errata/RHSA-2008-0209.html
http://www.securityfocus.com/archive/1/490196/100/0/threaded
http://www.securityfocus.com/bid/28448
http://www.securitytracker.com/id?1019694
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.447313
http://www.ubuntu.com/usn/usn-592-1
http://www.ubuntu.com/usn/usn-605-1
http://www.us-cert.gov/cas/techalerts/TA08-087A.html US Government Resource
http://www.vupen.com/english/advisories/2008/0998/references
http://www.vupen.com/english/advisories/2008/0999/references
http://www.vupen.com/english/advisories/2008/1793/references
http://www.vupen.com/english/advisories/2008/2091/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/41443
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11078
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html
http://rhn.redhat.com/errata/RHSA-2008-0208.html
http://secunia.com/advisories/29391 Vendor Advisory
http://secunia.com/advisories/29526
http://secunia.com/advisories/29539
http://secunia.com/advisories/29541
http://secunia.com/advisories/29547
http://secunia.com/advisories/29548
http://secunia.com/advisories/29550
http://secunia.com/advisories/29558
http://secunia.com/advisories/29560 Vendor Advisory
http://secunia.com/advisories/29607
http://secunia.com/advisories/29616
http://secunia.com/advisories/29645
http://secunia.com/advisories/30016
http://secunia.com/advisories/30094
http://secunia.com/advisories/30105
http://secunia.com/advisories/30192
http://secunia.com/advisories/30327
http://secunia.com/advisories/30370
http://secunia.com/advisories/30620
http://secunia.com/advisories/31043
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128
http://www.debian.org/security/2008/dsa-1532
http://www.debian.org/security/2008/dsa-1534
http://www.debian.org/security/2008/dsa-1535
http://www.debian.org/security/2008/dsa-1574
http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml
http://www.kb.cert.org/vuls/id/466521 US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2008:080
http://www.mandriva.com/security/advisories?name=MDVSA-2008:155
http://www.mozilla.org/security/announce/2008/mfsa2008-14.html
http://www.redhat.com/support/errata/RHSA-2008-0207.html
http://www.redhat.com/support/errata/RHSA-2008-0209.html
http://www.securityfocus.com/archive/1/490196/100/0/threaded
http://www.securityfocus.com/bid/28448
http://www.securitytracker.com/id?1019694
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.447313
http://www.ubuntu.com/usn/usn-592-1
http://www.ubuntu.com/usn/usn-605-1
http://www.us-cert.gov/cas/techalerts/TA08-087A.html US Government Resource
http://www.vupen.com/english/advisories/2008/0998/references
http://www.vupen.com/english/advisories/2008/0999/references
http://www.vupen.com/english/advisories/2008/1793/references
http://www.vupen.com/english/advisories/2008/2091/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/41443
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11078
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:44

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html - () http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00002.html -
References () http://rhn.redhat.com/errata/RHSA-2008-0208.html - () http://rhn.redhat.com/errata/RHSA-2008-0208.html -
References () http://secunia.com/advisories/29391 - Vendor Advisory () http://secunia.com/advisories/29391 - Vendor Advisory
References () http://secunia.com/advisories/29526 - () http://secunia.com/advisories/29526 -
References () http://secunia.com/advisories/29539 - () http://secunia.com/advisories/29539 -
References () http://secunia.com/advisories/29541 - () http://secunia.com/advisories/29541 -
References () http://secunia.com/advisories/29547 - () http://secunia.com/advisories/29547 -
References () http://secunia.com/advisories/29548 - () http://secunia.com/advisories/29548 -
References () http://secunia.com/advisories/29550 - () http://secunia.com/advisories/29550 -
References () http://secunia.com/advisories/29558 - () http://secunia.com/advisories/29558 -
References () http://secunia.com/advisories/29560 - Vendor Advisory () http://secunia.com/advisories/29560 - Vendor Advisory
References () http://secunia.com/advisories/29607 - () http://secunia.com/advisories/29607 -
References () http://secunia.com/advisories/29616 - () http://secunia.com/advisories/29616 -
References () http://secunia.com/advisories/29645 - () http://secunia.com/advisories/29645 -
References () http://secunia.com/advisories/30016 - () http://secunia.com/advisories/30016 -
References () http://secunia.com/advisories/30094 - () http://secunia.com/advisories/30094 -
References () http://secunia.com/advisories/30105 - () http://secunia.com/advisories/30105 -
References () http://secunia.com/advisories/30192 - () http://secunia.com/advisories/30192 -
References () http://secunia.com/advisories/30327 - () http://secunia.com/advisories/30327 -
References () http://secunia.com/advisories/30370 - () http://secunia.com/advisories/30370 -
References () http://secunia.com/advisories/30620 - () http://secunia.com/advisories/30620 -
References () http://secunia.com/advisories/31043 - () http://secunia.com/advisories/31043 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-239546-1 -
References () http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128 - () http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0128 -
References () http://www.debian.org/security/2008/dsa-1532 - () http://www.debian.org/security/2008/dsa-1532 -
References () http://www.debian.org/security/2008/dsa-1534 - () http://www.debian.org/security/2008/dsa-1534 -
References () http://www.debian.org/security/2008/dsa-1535 - () http://www.debian.org/security/2008/dsa-1535 -
References () http://www.debian.org/security/2008/dsa-1574 - () http://www.debian.org/security/2008/dsa-1574 -
References () http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml - () http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml -
References () http://www.kb.cert.org/vuls/id/466521 - US Government Resource () http://www.kb.cert.org/vuls/id/466521 - US Government Resource
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:080 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:080 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:155 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:155 -
References () http://www.mozilla.org/security/announce/2008/mfsa2008-14.html - () http://www.mozilla.org/security/announce/2008/mfsa2008-14.html -
References () http://www.redhat.com/support/errata/RHSA-2008-0207.html - () http://www.redhat.com/support/errata/RHSA-2008-0207.html -
References () http://www.redhat.com/support/errata/RHSA-2008-0209.html - () http://www.redhat.com/support/errata/RHSA-2008-0209.html -
References () http://www.securityfocus.com/archive/1/490196/100/0/threaded - () http://www.securityfocus.com/archive/1/490196/100/0/threaded -
References () http://www.securityfocus.com/bid/28448 - () http://www.securityfocus.com/bid/28448 -
References () http://www.securitytracker.com/id?1019694 - () http://www.securitytracker.com/id?1019694 -
References () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.447313 - () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.447313 -
References () http://www.ubuntu.com/usn/usn-592-1 - () http://www.ubuntu.com/usn/usn-592-1 -
References () http://www.ubuntu.com/usn/usn-605-1 - () http://www.ubuntu.com/usn/usn-605-1 -
References () http://www.us-cert.gov/cas/techalerts/TA08-087A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA08-087A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2008/0998/references - () http://www.vupen.com/english/advisories/2008/0998/references -
References () http://www.vupen.com/english/advisories/2008/0999/references - () http://www.vupen.com/english/advisories/2008/0999/references -
References () http://www.vupen.com/english/advisories/2008/1793/references - () http://www.vupen.com/english/advisories/2008/1793/references -
References () http://www.vupen.com/english/advisories/2008/2091/references - () http://www.vupen.com/english/advisories/2008/2091/references -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/41443 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/41443 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11078 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11078 -
References () https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html - () https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html - () https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html -

Information

Published : 2008-03-27 10:44

Updated : 2024-11-21 00:44


NVD link : CVE-2008-1233

Mitre link : CVE-2008-1233

CVE.ORG link : CVE-2008-1233


JSON object : View

Products Affected

mozilla

  • firefox
  • thunderbird
  • seamonkey
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')