Mozilla based browsers, including Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8, allow remote attackers to bypass the same origin policy, steal cookies, and conduct other attacks by writing a URI with a null byte to the hostname (location.hostname) DOM property, due to interactions with DNS resolver code.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:27
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc - | |
References | () ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc - | |
References | () http://fedoranews.org/cms/node/2713 - | |
References | () http://fedoranews.org/cms/node/2728 - | |
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 - | |
References | () http://lcamtuf.dione.cc/ffhostname.html - Exploit | |
References | () http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2007-0077.html - Vendor Advisory | |
References | () http://secunia.com/advisories/24175 - Vendor Advisory | |
References | () http://secunia.com/advisories/24205 - Vendor Advisory | |
References | () http://secunia.com/advisories/24238 - Vendor Advisory | |
References | () http://secunia.com/advisories/24287 - Vendor Advisory | |
References | () http://secunia.com/advisories/24290 - Vendor Advisory | |
References | () http://secunia.com/advisories/24293 - Vendor Advisory | |
References | () http://secunia.com/advisories/24320 - Vendor Advisory | |
References | () http://secunia.com/advisories/24328 - Vendor Advisory | |
References | () http://secunia.com/advisories/24333 - Vendor Advisory | |
References | () http://secunia.com/advisories/24342 - Vendor Advisory | |
References | () http://secunia.com/advisories/24343 - Vendor Advisory | |
References | () http://secunia.com/advisories/24384 - Vendor Advisory | |
References | () http://secunia.com/advisories/24393 - Vendor Advisory | |
References | () http://secunia.com/advisories/24395 - Vendor Advisory | |
References | () http://secunia.com/advisories/24437 - Vendor Advisory | |
References | () http://secunia.com/advisories/24455 - Vendor Advisory | |
References | () http://secunia.com/advisories/24457 - Vendor Advisory | |
References | () http://secunia.com/advisories/24650 - Vendor Advisory | |
References | () http://secunia.com/advisories/25588 - | |
References | () http://security.gentoo.org/glsa/glsa-200703-04.xml - | |
References | () http://securityreason.com/securityalert/2262 - | |
References | () http://securitytracker.com/id?1017654 - | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131 - | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851 - | |
References | () http://www.debian.org/security/2007/dsa-1336 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml - | |
References | () http://www.kb.cert.org/vuls/id/885753 - US Government Resource | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:050 - | |
References | () http://www.mozilla.org/security/announce/2007/mfsa2007-07.html - | |
References | () http://www.novell.com/linux/security/advisories/2007_22_mozilla.html - | |
References | () http://www.osvdb.org/32104 - | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0078.html - Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0079.html - Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0097.html - Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0108.html - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/460126/100/200/threaded - | |
References | () http://www.securityfocus.com/archive/1/460217/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/461336/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/461809/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/22566 - | |
References | () http://www.ubuntu.com/usn/usn-428-1 - | |
References | () http://www.vupen.com/english/advisories/2007/0624 - | |
References | () http://www.vupen.com/english/advisories/2007/0718 - | |
References | () http://www.vupen.com/english/advisories/2008/0083 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=370445 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/32533 - | |
References | () https://issues.rpath.com/browse/RPL-1081 - | |
References | () https://issues.rpath.com/browse/RPL-1103 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9730 - |
Information
Published : 2007-02-16 01:28
Updated : 2024-11-21 00:27
NVD link : CVE-2007-0981
Mitre link : CVE-2007-0981
CVE.ORG link : CVE-2007-0981
JSON object : View
Products Affected
mozilla
- firefox
- seamonkey
CWE
CWE-264
Permissions, Privileges, and Access Controls