Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 do not properly escape quote characters used for XML processing, which allows remote attackers to conduct XML injection attacks via the default namespace in an E4X document.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 00:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html - Third Party Advisory | |
References | () http://secunia.com/advisories/32684 - Third Party Advisory | |
References | () http://secunia.com/advisories/32693 - Third Party Advisory | |
References | () http://secunia.com/advisories/32694 - Third Party Advisory | |
References | () http://secunia.com/advisories/32695 - Third Party Advisory | |
References | () http://secunia.com/advisories/32713 - Third Party Advisory | |
References | () http://secunia.com/advisories/32714 - Third Party Advisory | |
References | () http://secunia.com/advisories/32715 - Third Party Advisory | |
References | () http://secunia.com/advisories/32721 - Third Party Advisory | |
References | () http://secunia.com/advisories/32778 - Third Party Advisory | |
References | () http://secunia.com/advisories/32798 - Third Party Advisory | |
References | () http://secunia.com/advisories/32845 - Third Party Advisory | |
References | () http://secunia.com/advisories/32853 - Third Party Advisory | |
References | () http://secunia.com/advisories/33433 - Third Party Advisory | |
References | () http://secunia.com/advisories/33434 - Third Party Advisory | |
References | () http://secunia.com/advisories/34501 - Third Party Advisory | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1 - Broken Link | |
References | () http://ubuntu.com/usn/usn-667-1 - Third Party Advisory | |
References | () http://www.debian.org/security/2008/dsa-1669 - Third Party Advisory | |
References | () http://www.debian.org/security/2008/dsa-1671 - Third Party Advisory | |
References | () http://www.debian.org/security/2009/dsa-1696 - Third Party Advisory | |
References | () http://www.debian.org/security/2009/dsa-1697 - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2008:228 - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2008:230 - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2008:235 - Third Party Advisory | |
References | () http://www.mozilla.org/security/announce/2008/mfsa2008-58.html - Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2008-0976.html - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2008-0977.html - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2008-0978.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/32281 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id?1021192 - Third Party Advisory, VDB Entry | |
References | () http://www.us-cert.gov/cas/techalerts/TA08-319A.html - Third Party Advisory, US Government Resource | |
References | () http://www.vupen.com/english/advisories/2008/3146 - Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2009/0977 - Third Party Advisory | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=453915 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9063 - Third Party Advisory | |
References | () https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html - Third Party Advisory | |
References | () https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html - Third Party Advisory |
Information
Published : 2008-11-13 11:30
Updated : 2024-11-21 00:53
NVD link : CVE-2008-5024
Mitre link : CVE-2008-5024
CVE.ORG link : CVE-2008-5024
JSON object : View
Products Affected
mozilla
- firefox
- thunderbird
- seamonkey
canonical
- ubuntu_linux
debian
- debian_linux
CWE
CWE-91
XML Injection (aka Blind XPath Injection)