CVE-2003-0791

The Script.prototype.freeze/thaw functionality in Mozilla 1.4 and earlier allows attackers to execute native methods by modifying the string used as input to the script.thaw JavaScript function, which is then deserialized and executed.
References
Link Resource
http://secunia.com/advisories/11103/ URL Repurposed
http://www.mandriva.com/security/advisories?name=MDKSA-2004:021 Broken Link
http://www.osvdb.org/8390 Broken Link Patch Vendor Advisory
http://www.securityfocus.com/advisories/6979 Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory
http://www.securityfocus.com/bid/9322 Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=221526 Issue Tracking Patch Vendor Advisory
http://secunia.com/advisories/11103/ URL Repurposed
http://www.mandriva.com/security/advisories?name=MDKSA-2004:021 Broken Link
http://www.osvdb.org/8390 Broken Link Patch Vendor Advisory
http://www.securityfocus.com/advisories/6979 Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory
http://www.securityfocus.com/bid/9322 Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=221526 Issue Tracking Patch Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:mozilla:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*

History

20 Nov 2024, 23:45

Type Values Removed Values Added
References () http://secunia.com/advisories/11103/ - URL Repurposed () http://secunia.com/advisories/11103/ - URL Repurposed
References () http://www.mandriva.com/security/advisories?name=MDKSA-2004:021 - Broken Link () http://www.mandriva.com/security/advisories?name=MDKSA-2004:021 - Broken Link
References () http://www.osvdb.org/8390 - Broken Link, Patch, Vendor Advisory () http://www.osvdb.org/8390 - Broken Link, Patch, Vendor Advisory
References () http://www.securityfocus.com/advisories/6979 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory () http://www.securityfocus.com/advisories/6979 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
References () http://www.securityfocus.com/bid/9322 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory () http://www.securityfocus.com/bid/9322 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=221526 - Issue Tracking, Patch, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=221526 - Issue Tracking, Patch, Vendor Advisory

25 Jan 2024, 02:14

Type Values Removed Values Added
CVSS v2 : 7.5
v3 : unknown
v2 : 7.5
v3 : 9.8
References (MISC) https://bugzilla.mozilla.org/show_bug.cgi?id=221526 - Patch, Vendor Advisory (MISC) https://bugzilla.mozilla.org/show_bug.cgi?id=221526 - Issue Tracking, Patch, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/11103/ - Patch, Vendor Advisory (SECUNIA) http://secunia.com/advisories/11103/ - URL Repurposed
References (SCO) http://www.securityfocus.com/advisories/6979 - Patch, Vendor Advisory (SCO) http://www.securityfocus.com/advisories/6979 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
References (MANDRAKE) http://www.mandriva.com/security/advisories?name=MDKSA-2004:021 - (MANDRAKE) http://www.mandriva.com/security/advisories?name=MDKSA-2004:021 - Broken Link
References (BID) http://www.securityfocus.com/bid/9322 - Patch, Vendor Advisory (BID) http://www.securityfocus.com/bid/9322 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
References (OSVDB) http://www.osvdb.org/8390 - Patch, Vendor Advisory (OSVDB) http://www.osvdb.org/8390 - Broken Link, Patch, Vendor Advisory
CWE NVD-CWE-Other CWE-502
CPE cpe:2.3:a:mozilla:mozilla:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.2:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.1:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.48:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.4.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.35:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.1:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.2:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:*:*:*:*:*:*:*:*

Information

Published : 2003-10-07 04:00

Updated : 2024-11-20 23:45


NVD link : CVE-2003-0791

Mitre link : CVE-2003-0791

CVE.ORG link : CVE-2003-0791


JSON object : View

Products Affected

sco

  • openserver

mozilla

  • mozilla
CWE
CWE-502

Deserialization of Untrusted Data