The XPConnect component in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to "pollute XPCNativeWrappers" and execute arbitrary code with chrome privileges via vectors related to (1) chrome XBL and (2) chrome JS.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 00:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://download.novell.com/Download?buildid=WZXONb-tqBw~ - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00005.html - Third Party Advisory | |
References | () http://secunia.com/advisories/31984 - Third Party Advisory | |
References | () http://secunia.com/advisories/31985 - Third Party Advisory | |
References | () http://secunia.com/advisories/31987 - Third Party Advisory | |
References | () http://secunia.com/advisories/32007 - Third Party Advisory | |
References | () http://secunia.com/advisories/32010 - Third Party Advisory | |
References | () http://secunia.com/advisories/32011 - Third Party Advisory | |
References | () http://secunia.com/advisories/32012 - Third Party Advisory | |
References | () http://secunia.com/advisories/32025 - Third Party Advisory | |
References | () http://secunia.com/advisories/32042 - Third Party Advisory | |
References | () http://secunia.com/advisories/32044 - Third Party Advisory | |
References | () http://secunia.com/advisories/32082 - Third Party Advisory | |
References | () http://secunia.com/advisories/32089 - Third Party Advisory | |
References | () http://secunia.com/advisories/32092 - Third Party Advisory | |
References | () http://secunia.com/advisories/32095 - Third Party Advisory | |
References | () http://secunia.com/advisories/32096 - Third Party Advisory | |
References | () http://secunia.com/advisories/32144 - Third Party Advisory | |
References | () http://secunia.com/advisories/32185 - Third Party Advisory | |
References | () http://secunia.com/advisories/32196 - Third Party Advisory | |
References | () http://secunia.com/advisories/32845 - Third Party Advisory | |
References | () http://secunia.com/advisories/33433 - Third Party Advisory | |
References | () http://secunia.com/advisories/33434 - Third Party Advisory | |
References | () http://secunia.com/advisories/34501 - Third Party Advisory | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.379422 - Third Party Advisory | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.405232 - Third Party Advisory | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.412123 - Third Party Advisory | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1 - Broken Link | |
References | () http://www.debian.org/security/2008/dsa-1649 - Third Party Advisory | |
References | () http://www.debian.org/security/2008/dsa-1669 - Third Party Advisory | |
References | () http://www.debian.org/security/2009/dsa-1696 - Third Party Advisory | |
References | () http://www.debian.org/security/2009/dsa-1697 - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2008:205 - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2008:206 - Third Party Advisory | |
References | () http://www.mozilla.org/security/announce/2008/mfsa2008-41.html - Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2008-0879.html - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2008-0882.html - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2008-0908.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/31346 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id?1020915 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/usn-645-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/usn-645-2 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/usn-647-1 - Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2008/2661 - Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2009/0977 - Third Party Advisory | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=444075 - Issue Tracking, Vendor Advisory | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=444077 - Issue Tracking, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/45349 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9679 - Third Party Advisory | |
References | () https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01335.html - Third Party Advisory | |
References | () https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01384.html - Third Party Advisory | |
References | () https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01403.html - Third Party Advisory |
Information
Published : 2008-09-24 20:37
Updated : 2024-11-21 00:50
NVD link : CVE-2008-4058
Mitre link : CVE-2008-4058
CVE.ORG link : CVE-2008-4058
JSON object : View
Products Affected
mozilla
- firefox
- thunderbird
- seamonkey
canonical
- ubuntu_linux
debian
- debian_linux
CWE
CWE-264
Permissions, Privileges, and Access Controls