CVE-2009-1837

Race condition in the NPObjWrapper_NewResolve function in modules/plugin/base/src/nsJSNPRuntime.cpp in xul.dll in Mozilla Firefox 3 before 3.0.11 might allow remote attackers to execute arbitrary code via a page transition during Java applet loading, related to a use-after-free vulnerability for memory associated with a destroyed Java object.
References
Link Resource
http://secunia.com/advisories/34241 Broken Link Vendor Advisory
http://secunia.com/advisories/35331 Broken Link Vendor Advisory
http://secunia.com/advisories/35415 Broken Link
http://secunia.com/advisories/35431 Broken Link Vendor Advisory
http://secunia.com/advisories/35468 Broken Link
http://secunia.com/secunia_research/2009-19/ Broken Link Vendor Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.372468 Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1 Broken Link
http://www.debian.org/security/2009/dsa-1820 Mailing List Third Party Advisory
http://www.mozilla.org/security/announce/2009/mfsa2009-28.html Vendor Advisory
http://www.securityfocus.com/archive/1/504260/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/35326 Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/35360 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1022386 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2009/1572 Broken Link Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=486269 Exploit Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=503579 Issue Tracking
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10628 Broken Link
https://rhn.redhat.com/errata/RHSA-2009-1095.html Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00574.html Mailing List
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00657.html Mailing List
http://secunia.com/advisories/34241 Broken Link Vendor Advisory
http://secunia.com/advisories/35331 Broken Link Vendor Advisory
http://secunia.com/advisories/35415 Broken Link
http://secunia.com/advisories/35431 Broken Link Vendor Advisory
http://secunia.com/advisories/35468 Broken Link
http://secunia.com/secunia_research/2009-19/ Broken Link Vendor Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.372468 Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1 Broken Link
http://www.debian.org/security/2009/dsa-1820 Mailing List Third Party Advisory
http://www.mozilla.org/security/announce/2009/mfsa2009-28.html Vendor Advisory
http://www.securityfocus.com/archive/1/504260/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/35326 Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/35360 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1022386 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2009/1572 Broken Link Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=486269 Exploit Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=503579 Issue Tracking
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10628 Broken Link
https://rhn.redhat.com/errata/RHSA-2009-1095.html Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00574.html Mailing List
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00657.html Mailing List
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:4.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:03

Type Values Removed Values Added
References () http://secunia.com/advisories/34241 - Broken Link, Vendor Advisory () http://secunia.com/advisories/34241 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/35331 - Broken Link, Vendor Advisory () http://secunia.com/advisories/35331 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/35415 - Broken Link () http://secunia.com/advisories/35415 - Broken Link
References () http://secunia.com/advisories/35431 - Broken Link, Vendor Advisory () http://secunia.com/advisories/35431 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/35468 - Broken Link () http://secunia.com/advisories/35468 - Broken Link
References () http://secunia.com/secunia_research/2009-19/ - Broken Link, Vendor Advisory () http://secunia.com/secunia_research/2009-19/ - Broken Link, Vendor Advisory
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.372468 - Broken Link () http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.372468 - Broken Link
References () http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1 - Broken Link () http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1 - Broken Link
References () http://www.debian.org/security/2009/dsa-1820 - Mailing List, Third Party Advisory () http://www.debian.org/security/2009/dsa-1820 - Mailing List, Third Party Advisory
References () http://www.mozilla.org/security/announce/2009/mfsa2009-28.html - Vendor Advisory () http://www.mozilla.org/security/announce/2009/mfsa2009-28.html - Vendor Advisory
References () http://www.securityfocus.com/archive/1/504260/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/504260/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/35326 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/35326 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/35360 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/35360 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1022386 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1022386 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2009/1572 - Broken Link, Vendor Advisory () http://www.vupen.com/english/advisories/2009/1572 - Broken Link, Vendor Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=486269 - Exploit, Issue Tracking () https://bugzilla.mozilla.org/show_bug.cgi?id=486269 - Exploit, Issue Tracking
References () https://bugzilla.redhat.com/show_bug.cgi?id=503579 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=503579 - Issue Tracking
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10628 - Broken Link () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10628 - Broken Link
References () https://rhn.redhat.com/errata/RHSA-2009-1095.html - Third Party Advisory () https://rhn.redhat.com/errata/RHSA-2009-1095.html - Third Party Advisory
References () https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00574.html - Mailing List () https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00574.html - Mailing List
References () https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00657.html - Mailing List () https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00657.html - Mailing List

02 Feb 2024, 16:03

Type Values Removed Values Added
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10628 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10628 - Broken Link
References (SLACKWARE) http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.372468 - (SLACKWARE) http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.372468 - Broken Link
References (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00574.html - (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00574.html - Mailing List
References (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1 - (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1 - Broken Link
References (SECUNIA) http://secunia.com/advisories/35331 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/35331 - Broken Link, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/35415 - (SECUNIA) http://secunia.com/advisories/35415 - Broken Link
References (CONFIRM) https://bugzilla.mozilla.org/show_bug.cgi?id=486269 - Exploit (CONFIRM) https://bugzilla.mozilla.org/show_bug.cgi?id=486269 - Exploit, Issue Tracking
References (DEBIAN) http://www.debian.org/security/2009/dsa-1820 - (DEBIAN) http://www.debian.org/security/2009/dsa-1820 - Mailing List, Third Party Advisory
References (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00657.html - (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00657.html - Mailing List
References (SECUNIA) http://secunia.com/advisories/35431 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/35431 - Broken Link, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/34241 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/34241 - Broken Link, Vendor Advisory
References (BID) http://www.securityfocus.com/bid/35360 - (BID) http://www.securityfocus.com/bid/35360 - Broken Link, Third Party Advisory, VDB Entry
References (SECTRACK) http://www.securitytracker.com/id?1022386 - (SECTRACK) http://www.securitytracker.com/id?1022386 - Broken Link, Third Party Advisory, VDB Entry
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=503579 - (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=503579 - Issue Tracking
References (MISC) http://secunia.com/secunia_research/2009-19/ - Vendor Advisory (MISC) http://secunia.com/secunia_research/2009-19/ - Broken Link, Vendor Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2009/1572 - Vendor Advisory (VUPEN) http://www.vupen.com/english/advisories/2009/1572 - Broken Link, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/35468 - (SECUNIA) http://secunia.com/advisories/35468 - Broken Link
References (REDHAT) https://rhn.redhat.com/errata/RHSA-2009-1095.html - (REDHAT) https://rhn.redhat.com/errata/RHSA-2009-1095.html - Third Party Advisory
References (BUGTRAQ) http://www.securityfocus.com/archive/1/504260/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/504260/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (BID) http://www.securityfocus.com/bid/35326 - (BID) http://www.securityfocus.com/bid/35326 - Broken Link, Third Party Advisory, VDB Entry
CVSS v2 : 9.3
v3 : unknown
v2 : 9.3
v3 : 7.5
CWE CWE-416
First Time Redhat enterprise Linux Server Aus
Debian debian Linux
Redhat enterprise Linux Server
Debian
Redhat
Redhat enterprise Linux Eus
Fedoraproject fedora
Redhat enterprise Linux Workstation
Redhat enterprise Linux
Fedoraproject
Redhat enterprise Linux Desktop
CPE cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:4.8:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*

Information

Published : 2009-06-12 21:30

Updated : 2024-11-21 01:03


NVD link : CVE-2009-1837

Mitre link : CVE-2009-1837

CVE.ORG link : CVE-2009-1837


JSON object : View

Products Affected

mozilla

  • firefox

redhat

  • enterprise_linux_server
  • enterprise_linux
  • enterprise_linux_desktop
  • enterprise_linux_server_aus
  • enterprise_linux_eus
  • enterprise_linux_workstation

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

CWE-416

Use After Free