CVE-2008-1380

The JavaScript engine in Mozilla Firefox before 2.0.0.14, Thunderbird before 2.0.0.14, and SeaMonkey before 1.1.10 allows remote attackers to cause a denial of service (garbage collector crash) and possibly have other impacts via a crafted web page. NOTE: this is due to an incorrect fix for CVE-2008-1237.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html
http://secunia.com/advisories/29787 Patch Vendor Advisory
http://secunia.com/advisories/29793
http://secunia.com/advisories/29828
http://secunia.com/advisories/29860 Vendor Advisory
http://secunia.com/advisories/29883
http://secunia.com/advisories/29908
http://secunia.com/advisories/29911
http://secunia.com/advisories/29912
http://secunia.com/advisories/29947
http://secunia.com/advisories/30012
http://secunia.com/advisories/30029
http://secunia.com/advisories/30192
http://secunia.com/advisories/30327
http://secunia.com/advisories/30620
http://secunia.com/advisories/30717
http://secunia.com/advisories/31023
http://secunia.com/advisories/31377
http://secunia.com/advisories/33434
http://security.gentoo.org/glsa/glsa-200808-03.xml
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.391769
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1
http://www.debian.org/security/2008/dsa-1555
http://www.debian.org/security/2008/dsa-1558
http://www.debian.org/security/2008/dsa-1562
http://www.debian.org/security/2009/dsa-1696
http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml
http://www.kb.cert.org/vuls/id/441529 US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2008:110
http://www.mozilla.org/security/announce/2008/mfsa2008-20.html
http://www.novell.com/linux/security/advisories/2008_13_sr.html
http://www.redhat.com/support/errata/RHSA-2008-0222.html
http://www.redhat.com/support/errata/RHSA-2008-0223.html
http://www.redhat.com/support/errata/RHSA-2008-0224.html
http://www.securityfocus.com/archive/1/491838/100/0/threaded
http://www.securityfocus.com/bid/28818
http://www.securitytracker.com/id?1019873
http://www.ubuntu.com/usn/usn-602-1
http://www.vupen.com/english/advisories/2008/1251/references
http://www.vupen.com/english/advisories/2008/1793/references
https://bugzilla.mozilla.org/show_bug.cgi?id=425576
https://exchange.xforce.ibmcloud.com/vulnerabilities/41857
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10752
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00407.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00463.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html
http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html
http://secunia.com/advisories/29787 Patch Vendor Advisory
http://secunia.com/advisories/29793
http://secunia.com/advisories/29828
http://secunia.com/advisories/29860 Vendor Advisory
http://secunia.com/advisories/29883
http://secunia.com/advisories/29908
http://secunia.com/advisories/29911
http://secunia.com/advisories/29912
http://secunia.com/advisories/29947
http://secunia.com/advisories/30012
http://secunia.com/advisories/30029
http://secunia.com/advisories/30192
http://secunia.com/advisories/30327
http://secunia.com/advisories/30620
http://secunia.com/advisories/30717
http://secunia.com/advisories/31023
http://secunia.com/advisories/31377
http://secunia.com/advisories/33434
http://security.gentoo.org/glsa/glsa-200808-03.xml
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.391769
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1
http://www.debian.org/security/2008/dsa-1555
http://www.debian.org/security/2008/dsa-1558
http://www.debian.org/security/2008/dsa-1562
http://www.debian.org/security/2009/dsa-1696
http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml
http://www.kb.cert.org/vuls/id/441529 US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2008:110
http://www.mozilla.org/security/announce/2008/mfsa2008-20.html
http://www.novell.com/linux/security/advisories/2008_13_sr.html
http://www.redhat.com/support/errata/RHSA-2008-0222.html
http://www.redhat.com/support/errata/RHSA-2008-0223.html
http://www.redhat.com/support/errata/RHSA-2008-0224.html
http://www.securityfocus.com/archive/1/491838/100/0/threaded
http://www.securityfocus.com/bid/28818
http://www.securitytracker.com/id?1019873
http://www.ubuntu.com/usn/usn-602-1
http://www.vupen.com/english/advisories/2008/1251/references
http://www.vupen.com/english/advisories/2008/1793/references
https://bugzilla.mozilla.org/show_bug.cgi?id=425576
https://exchange.xforce.ibmcloud.com/vulnerabilities/41857
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10752
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00407.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00463.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0:beta1:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.99:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:2.0.0.11:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*

History

21 Nov 2024, 00:44

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html - () http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html -
References () http://secunia.com/advisories/29787 - Patch, Vendor Advisory () http://secunia.com/advisories/29787 - Patch, Vendor Advisory
References () http://secunia.com/advisories/29793 - () http://secunia.com/advisories/29793 -
References () http://secunia.com/advisories/29828 - () http://secunia.com/advisories/29828 -
References () http://secunia.com/advisories/29860 - Vendor Advisory () http://secunia.com/advisories/29860 - Vendor Advisory
References () http://secunia.com/advisories/29883 - () http://secunia.com/advisories/29883 -
References () http://secunia.com/advisories/29908 - () http://secunia.com/advisories/29908 -
References () http://secunia.com/advisories/29911 - () http://secunia.com/advisories/29911 -
References () http://secunia.com/advisories/29912 - () http://secunia.com/advisories/29912 -
References () http://secunia.com/advisories/29947 - () http://secunia.com/advisories/29947 -
References () http://secunia.com/advisories/30012 - () http://secunia.com/advisories/30012 -
References () http://secunia.com/advisories/30029 - () http://secunia.com/advisories/30029 -
References () http://secunia.com/advisories/30192 - () http://secunia.com/advisories/30192 -
References () http://secunia.com/advisories/30327 - () http://secunia.com/advisories/30327 -
References () http://secunia.com/advisories/30620 - () http://secunia.com/advisories/30620 -
References () http://secunia.com/advisories/30717 - () http://secunia.com/advisories/30717 -
References () http://secunia.com/advisories/31023 - () http://secunia.com/advisories/31023 -
References () http://secunia.com/advisories/31377 - () http://secunia.com/advisories/31377 -
References () http://secunia.com/advisories/33434 - () http://secunia.com/advisories/33434 -
References () http://security.gentoo.org/glsa/glsa-200808-03.xml - () http://security.gentoo.org/glsa/glsa-200808-03.xml -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152 -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.391769 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.391769 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-238492-1 -
References () http://www.debian.org/security/2008/dsa-1555 - () http://www.debian.org/security/2008/dsa-1555 -
References () http://www.debian.org/security/2008/dsa-1558 - () http://www.debian.org/security/2008/dsa-1558 -
References () http://www.debian.org/security/2008/dsa-1562 - () http://www.debian.org/security/2008/dsa-1562 -
References () http://www.debian.org/security/2009/dsa-1696 - () http://www.debian.org/security/2009/dsa-1696 -
References () http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml - () http://www.gentoo.org/security/en/glsa/glsa-200805-18.xml -
References () http://www.kb.cert.org/vuls/id/441529 - US Government Resource () http://www.kb.cert.org/vuls/id/441529 - US Government Resource
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:110 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:110 -
References () http://www.mozilla.org/security/announce/2008/mfsa2008-20.html - () http://www.mozilla.org/security/announce/2008/mfsa2008-20.html -
References () http://www.novell.com/linux/security/advisories/2008_13_sr.html - () http://www.novell.com/linux/security/advisories/2008_13_sr.html -
References () http://www.redhat.com/support/errata/RHSA-2008-0222.html - () http://www.redhat.com/support/errata/RHSA-2008-0222.html -
References () http://www.redhat.com/support/errata/RHSA-2008-0223.html - () http://www.redhat.com/support/errata/RHSA-2008-0223.html -
References () http://www.redhat.com/support/errata/RHSA-2008-0224.html - () http://www.redhat.com/support/errata/RHSA-2008-0224.html -
References () http://www.securityfocus.com/archive/1/491838/100/0/threaded - () http://www.securityfocus.com/archive/1/491838/100/0/threaded -
References () http://www.securityfocus.com/bid/28818 - () http://www.securityfocus.com/bid/28818 -
References () http://www.securitytracker.com/id?1019873 - () http://www.securitytracker.com/id?1019873 -
References () http://www.ubuntu.com/usn/usn-602-1 - () http://www.ubuntu.com/usn/usn-602-1 -
References () http://www.vupen.com/english/advisories/2008/1251/references - () http://www.vupen.com/english/advisories/2008/1251/references -
References () http://www.vupen.com/english/advisories/2008/1793/references - () http://www.vupen.com/english/advisories/2008/1793/references -
References () https://bugzilla.mozilla.org/show_bug.cgi?id=425576 - () https://bugzilla.mozilla.org/show_bug.cgi?id=425576 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/41857 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/41857 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10752 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10752 -
References () https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00407.html - () https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00407.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00463.html - () https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00463.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html - () https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00058.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html - () https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00074.html -

07 Nov 2023, 02:01

Type Values Removed Values Added
Summary The JavaScript engine in Mozilla Firefox before 2.0.0.14, Thunderbird before 2.0.0.14, and SeaMonkey before 1.1.10 allows remote attackers to cause a denial of service (garbage collector crash) and possibly have other impacts via a crafted web page. NOTE: this is due to an incorrect fix for CVE-2008-1237. The JavaScript engine in Mozilla Firefox before 2.0.0.14, Thunderbird before 2.0.0.14, and SeaMonkey before 1.1.10 allows remote attackers to cause a denial of service (garbage collector crash) and possibly have other impacts via a crafted web page. NOTE: this is due to an incorrect fix for CVE-2008-1237.

Information

Published : 2008-04-17 19:05

Updated : 2024-11-21 00:44


NVD link : CVE-2008-1380

Mitre link : CVE-2008-1380

CVE.ORG link : CVE-2008-1380


JSON object : View

Products Affected

mozilla

  • thunderbird
  • firefox
  • seamonkey
CWE
CWE-399

Resource Management Errors