CVE-2008-0420

modules/libpr0n/decoders/bmp/nsBMPDecoder.cpp in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 does not properly perform certain calculations related to the mColors table, which allows remote attackers to read portions of memory uninitialized via a crafted 8-bit bitmap (BMP) file that triggers an out-of-bounds read within the heap, as demonstrated using a CANVAS element; or cause a denial of service (application crash) via a crafted 8-bit bitmap file that triggers an out-of-bounds read. NOTE: the initial public reports stated that this affected Firefox in Ubuntu 6.06 through 7.10.
References
Link Resource
http://browser.netscape.com/releasenotes/
http://secunia.com/advisories/28758 Vendor Advisory
http://secunia.com/advisories/28839 Vendor Advisory
http://secunia.com/advisories/29049 Vendor Advisory
http://secunia.com/advisories/29098 Vendor Advisory
http://secunia.com/advisories/29167 Vendor Advisory
http://secunia.com/advisories/30327 Vendor Advisory
http://secunia.com/advisories/30620 Vendor Advisory
http://securitytracker.com/id?1019434
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1
http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:048
http://www.mozilla.org/security/announce/2008/mfsa2008-07.html
http://www.securityfocus.com/archive/1/488264/100/0/threaded
http://www.securityfocus.com/bid/27826
http://www.ubuntu.com/usn/usn-582-1
http://www.ubuntu.com/usn/usn-582-2
http://www.vupen.com/english/advisories/2008/0627/references Vendor Advisory
http://www.vupen.com/english/advisories/2008/1793/references Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=408076
https://exchange.xforce.ibmcloud.com/vulnerabilities/40491
https://exchange.xforce.ibmcloud.com/vulnerabilities/40606
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10119
https://usn.ubuntu.com/576-1/
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html
http://browser.netscape.com/releasenotes/
http://secunia.com/advisories/28758 Vendor Advisory
http://secunia.com/advisories/28839 Vendor Advisory
http://secunia.com/advisories/29049 Vendor Advisory
http://secunia.com/advisories/29098 Vendor Advisory
http://secunia.com/advisories/29167 Vendor Advisory
http://secunia.com/advisories/30327 Vendor Advisory
http://secunia.com/advisories/30620 Vendor Advisory
http://securitytracker.com/id?1019434
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1
http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:048
http://www.mozilla.org/security/announce/2008/mfsa2008-07.html
http://www.securityfocus.com/archive/1/488264/100/0/threaded
http://www.securityfocus.com/bid/27826
http://www.ubuntu.com/usn/usn-582-1
http://www.ubuntu.com/usn/usn-582-2
http://www.vupen.com/english/advisories/2008/0627/references Vendor Advisory
http://www.vupen.com/english/advisories/2008/1793/references Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=408076
https://exchange.xforce.ibmcloud.com/vulnerabilities/40491
https://exchange.xforce.ibmcloud.com/vulnerabilities/40606
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10119
https://usn.ubuntu.com/576-1/
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*

History

21 Nov 2024, 00:42

Type Values Removed Values Added
References () http://browser.netscape.com/releasenotes/ - () http://browser.netscape.com/releasenotes/ -
References () http://secunia.com/advisories/28758 - Vendor Advisory () http://secunia.com/advisories/28758 - Vendor Advisory
References () http://secunia.com/advisories/28839 - Vendor Advisory () http://secunia.com/advisories/28839 - Vendor Advisory
References () http://secunia.com/advisories/29049 - Vendor Advisory () http://secunia.com/advisories/29049 - Vendor Advisory
References () http://secunia.com/advisories/29098 - Vendor Advisory () http://secunia.com/advisories/29098 - Vendor Advisory
References () http://secunia.com/advisories/29167 - Vendor Advisory () http://secunia.com/advisories/29167 - Vendor Advisory
References () http://secunia.com/advisories/30327 - Vendor Advisory () http://secunia.com/advisories/30327 - Vendor Advisory
References () http://secunia.com/advisories/30620 - Vendor Advisory () http://secunia.com/advisories/30620 - Vendor Advisory
References () http://securitytracker.com/id?1019434 - () http://securitytracker.com/id?1019434 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1 -
References () http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml - () http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:048 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:048 -
References () http://www.mozilla.org/security/announce/2008/mfsa2008-07.html - () http://www.mozilla.org/security/announce/2008/mfsa2008-07.html -
References () http://www.securityfocus.com/archive/1/488264/100/0/threaded - () http://www.securityfocus.com/archive/1/488264/100/0/threaded -
References () http://www.securityfocus.com/bid/27826 - () http://www.securityfocus.com/bid/27826 -
References () http://www.ubuntu.com/usn/usn-582-1 - () http://www.ubuntu.com/usn/usn-582-1 -
References () http://www.ubuntu.com/usn/usn-582-2 - () http://www.ubuntu.com/usn/usn-582-2 -
References () http://www.vupen.com/english/advisories/2008/0627/references - Vendor Advisory () http://www.vupen.com/english/advisories/2008/0627/references - Vendor Advisory
References () http://www.vupen.com/english/advisories/2008/1793/references - Vendor Advisory () http://www.vupen.com/english/advisories/2008/1793/references - Vendor Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=408076 - () https://bugzilla.mozilla.org/show_bug.cgi?id=408076 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/40491 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/40491 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/40606 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/40606 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10119 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10119 -
References () https://usn.ubuntu.com/576-1/ - () https://usn.ubuntu.com/576-1/ -
References () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html - () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00905.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html - () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00946.html -

Information

Published : 2008-02-12 03:00

Updated : 2024-11-21 00:42


NVD link : CVE-2008-0420

Mitre link : CVE-2008-0420

CVE.ORG link : CVE-2008-0420


JSON object : View

Products Affected

mozilla

  • firefox
  • thunderbird
  • seamonkey
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor