CVE-2007-0994

A regression error in Mozilla Firefox 2.x before 2.0.0.2 and 1.x before 1.5.0.10, and SeaMonkey 1.1 before 1.1.1 and 1.0 before 1.0.8, allows remote attackers to execute arbitrary JavaScript as the user via an HTML mail message with a javascript: URI in an (1) img, (2) link, or (3) style tag, which bypasses the access checks and executes code with chrome privileges.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc Broken Link
ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc Broken Link
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=230733 Exploit Issue Tracking Patch Third Party Advisory
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 Broken Link
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 Broken Link
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html Broken Link
http://secunia.com/advisories/24384 Third Party Advisory
http://secunia.com/advisories/24395 Third Party Advisory
http://secunia.com/advisories/24455 Third Party Advisory
http://secunia.com/advisories/24457 Third Party Advisory
http://secunia.com/advisories/24650 Third Party Advisory
http://secunia.com/advisories/25588 Third Party Advisory
http://securitytracker.com/id?1017726 Third Party Advisory VDB Entry
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131 Mailing List Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851 Mailing List Third Party Advisory
http://www.debian.org/security/2007/dsa-1336 Third Party Advisory
http://www.mozilla.org/security/announce/2007/mfsa2007-09.html Vendor Advisory
http://www.novell.com/linux/security/advisories/2007_22_mozilla.html Broken Link
http://www.redhat.com/support/errata/RHSA-2007-0078.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2007-0097.html Third Party Advisory
http://www.securityfocus.com/bid/22826 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/0823 Third Party Advisory
https://issues.rpath.com/browse/RPL-1103 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9749 Third Party Advisory
ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc Broken Link
ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc Broken Link
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=230733 Exploit Issue Tracking Patch Third Party Advisory
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 Broken Link
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 Broken Link
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html Broken Link
http://secunia.com/advisories/24384 Third Party Advisory
http://secunia.com/advisories/24395 Third Party Advisory
http://secunia.com/advisories/24455 Third Party Advisory
http://secunia.com/advisories/24457 Third Party Advisory
http://secunia.com/advisories/24650 Third Party Advisory
http://secunia.com/advisories/25588 Third Party Advisory
http://securitytracker.com/id?1017726 Third Party Advisory VDB Entry
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131 Mailing List Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851 Mailing List Third Party Advisory
http://www.debian.org/security/2007/dsa-1336 Third Party Advisory
http://www.mozilla.org/security/announce/2007/mfsa2007-09.html Vendor Advisory
http://www.novell.com/linux/security/advisories/2007_22_mozilla.html Broken Link
http://www.redhat.com/support/errata/RHSA-2007-0078.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2007-0097.html Third Party Advisory
http://www.securityfocus.com/bid/22826 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/0823 Third Party Advisory
https://issues.rpath.com/browse/RPL-1103 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9749 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:27

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc - Broken Link () ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc - Broken Link
References () ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc - Broken Link () ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc - Broken Link
References () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=230733 - Exploit, Patch, Issue Tracking, Third Party Advisory () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=230733 - Exploit, Issue Tracking, Patch, Third Party Advisory
References () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 - Broken Link () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 - Broken Link
References () http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html - Broken Link () http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html - Broken Link
References () http://secunia.com/advisories/24384 - Third Party Advisory () http://secunia.com/advisories/24384 - Third Party Advisory
References () http://secunia.com/advisories/24395 - Third Party Advisory () http://secunia.com/advisories/24395 - Third Party Advisory
References () http://secunia.com/advisories/24455 - Third Party Advisory () http://secunia.com/advisories/24455 - Third Party Advisory
References () http://secunia.com/advisories/24457 - Third Party Advisory () http://secunia.com/advisories/24457 - Third Party Advisory
References () http://secunia.com/advisories/24650 - Third Party Advisory () http://secunia.com/advisories/24650 - Third Party Advisory
References () http://secunia.com/advisories/25588 - Third Party Advisory () http://secunia.com/advisories/25588 - Third Party Advisory
References () http://securitytracker.com/id?1017726 - Third Party Advisory, VDB Entry () http://securitytracker.com/id?1017726 - Third Party Advisory, VDB Entry
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131 - Mailing List, Third Party Advisory () http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131 - Mailing List, Third Party Advisory
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851 - Mailing List, Third Party Advisory () http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851 - Mailing List, Third Party Advisory
References () http://www.debian.org/security/2007/dsa-1336 - Third Party Advisory () http://www.debian.org/security/2007/dsa-1336 - Third Party Advisory
References () http://www.mozilla.org/security/announce/2007/mfsa2007-09.html - Vendor Advisory () http://www.mozilla.org/security/announce/2007/mfsa2007-09.html - Vendor Advisory
References () http://www.novell.com/linux/security/advisories/2007_22_mozilla.html - Broken Link () http://www.novell.com/linux/security/advisories/2007_22_mozilla.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2007-0078.html - Third Party Advisory () http://www.redhat.com/support/errata/RHSA-2007-0078.html - Third Party Advisory
References () http://www.redhat.com/support/errata/RHSA-2007-0097.html - Third Party Advisory () http://www.redhat.com/support/errata/RHSA-2007-0097.html - Third Party Advisory
References () http://www.securityfocus.com/bid/22826 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/22826 - Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2007/0823 - Third Party Advisory () http://www.vupen.com/english/advisories/2007/0823 - Third Party Advisory
References () https://issues.rpath.com/browse/RPL-1103 - Broken Link () https://issues.rpath.com/browse/RPL-1103 - Broken Link
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9749 - Third Party Advisory () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9749 - Third Party Advisory

Information

Published : 2007-03-06 00:19

Updated : 2024-11-21 00:27


NVD link : CVE-2007-0994

Mitre link : CVE-2007-0994

CVE.ORG link : CVE-2007-0994


JSON object : View

Products Affected

debian

  • debian_linux

mozilla

  • firefox
  • seamonkey
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')