CVE-2005-2270

Firefox before 1.0.5 and Mozilla before 1.7.9 does not properly clone base objects, which allows remote attackers to execute arbitrary code by navigating the prototype chain to reach a privileged object.
References
Link Resource
http://secunia.com/advisories/16043
http://secunia.com/advisories/16059
http://secunia.com/advisories/19823
http://securitytracker.com/id?1014470
http://www.ciac.org/ciac/bulletins/p-252.shtml
http://www.debian.org/security/2005/dsa-810
http://www.kb.cert.org/vuls/id/652366 US Government Resource
http://www.mozilla.org/security/announce/mfsa2005-56.html Patch Vendor Advisory
http://www.novell.com/linux/security/advisories/2005_18_sr.html
http://www.novell.com/linux/security/advisories/2005_45_mozilla.html
http://www.novell.com/linux/security/advisories/2006_04_25.html
http://www.redhat.com/support/errata/RHSA-2005-586.html
http://www.redhat.com/support/errata/RHSA-2005-587.html
http://www.redhat.com/support/errata/RHSA-2005-601.html
http://www.securityfocus.com/bid/14242
http://www.vupen.com/english/advisories/2005/1075
https://bugzilla.mozilla.org/show_bug.cgi?id=294795 Exploit Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=294799 Exploit Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=295011 Exploit Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=296397 Exploit Vendor Advisory
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100003
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11751
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A550
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A817
http://secunia.com/advisories/16043
http://secunia.com/advisories/16059
http://secunia.com/advisories/19823
http://securitytracker.com/id?1014470
http://www.ciac.org/ciac/bulletins/p-252.shtml
http://www.debian.org/security/2005/dsa-810
http://www.kb.cert.org/vuls/id/652366 US Government Resource
http://www.mozilla.org/security/announce/mfsa2005-56.html Patch Vendor Advisory
http://www.novell.com/linux/security/advisories/2005_18_sr.html
http://www.novell.com/linux/security/advisories/2005_45_mozilla.html
http://www.novell.com/linux/security/advisories/2006_04_25.html
http://www.redhat.com/support/errata/RHSA-2005-586.html
http://www.redhat.com/support/errata/RHSA-2005-587.html
http://www.redhat.com/support/errata/RHSA-2005-601.html
http://www.securityfocus.com/bid/14242
http://www.vupen.com/english/advisories/2005/1075
https://bugzilla.mozilla.org/show_bug.cgi?id=294795 Exploit Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=294799 Exploit Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=295011 Exploit Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=296397 Exploit Vendor Advisory
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100003
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11751
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A550
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A817
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.5:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.5:rc1:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.5:rc2:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.6:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.6:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:rc1:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:rc2:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:rc3:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.8:*:*:*:*:*:*:*

History

20 Nov 2024, 23:59

Type Values Removed Values Added
References () http://secunia.com/advisories/16043 - () http://secunia.com/advisories/16043 -
References () http://secunia.com/advisories/16059 - () http://secunia.com/advisories/16059 -
References () http://secunia.com/advisories/19823 - () http://secunia.com/advisories/19823 -
References () http://securitytracker.com/id?1014470 - () http://securitytracker.com/id?1014470 -
References () http://www.ciac.org/ciac/bulletins/p-252.shtml - () http://www.ciac.org/ciac/bulletins/p-252.shtml -
References () http://www.debian.org/security/2005/dsa-810 - () http://www.debian.org/security/2005/dsa-810 -
References () http://www.kb.cert.org/vuls/id/652366 - US Government Resource () http://www.kb.cert.org/vuls/id/652366 - US Government Resource
References () http://www.mozilla.org/security/announce/mfsa2005-56.html - Patch, Vendor Advisory () http://www.mozilla.org/security/announce/mfsa2005-56.html - Patch, Vendor Advisory
References () http://www.novell.com/linux/security/advisories/2005_18_sr.html - () http://www.novell.com/linux/security/advisories/2005_18_sr.html -
References () http://www.novell.com/linux/security/advisories/2005_45_mozilla.html - () http://www.novell.com/linux/security/advisories/2005_45_mozilla.html -
References () http://www.novell.com/linux/security/advisories/2006_04_25.html - () http://www.novell.com/linux/security/advisories/2006_04_25.html -
References () http://www.redhat.com/support/errata/RHSA-2005-586.html - () http://www.redhat.com/support/errata/RHSA-2005-586.html -
References () http://www.redhat.com/support/errata/RHSA-2005-587.html - () http://www.redhat.com/support/errata/RHSA-2005-587.html -
References () http://www.redhat.com/support/errata/RHSA-2005-601.html - () http://www.redhat.com/support/errata/RHSA-2005-601.html -
References () http://www.securityfocus.com/bid/14242 - () http://www.securityfocus.com/bid/14242 -
References () http://www.vupen.com/english/advisories/2005/1075 - () http://www.vupen.com/english/advisories/2005/1075 -
References () https://bugzilla.mozilla.org/show_bug.cgi?id=294795 - Exploit, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=294795 - Exploit, Vendor Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=294799 - Exploit, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=294799 - Exploit, Vendor Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=295011 - Exploit, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=295011 - Exploit, Vendor Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=296397 - Exploit, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=296397 - Exploit, Vendor Advisory
References () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 - () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100003 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100003 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11751 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11751 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A550 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A550 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A817 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A817 -

Information

Published : 2005-07-13 04:00

Updated : 2024-11-20 23:59


NVD link : CVE-2005-2270

Mitre link : CVE-2005-2270

CVE.ORG link : CVE-2005-2270


JSON object : View

Products Affected

mozilla

  • firefox
  • mozilla