5
CVSSv2

CVE-2005-2265

Published: 13/07/2005 Updated: 11/10/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 510
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Firefox prior to 1.0.5, Mozilla prior to 1.7.9, and Netscape 8.0.2 and 7.2 allows remote malicious users to cause a denial of service (access violation and crash), and possibly execute arbitrary code, by calling InstallVersion.compareTo with an object instead of a string.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox 0.9.2

mozilla firefox 0.9.3

mozilla firefox 0.9

mozilla mozilla 1.4

mozilla mozilla 1.4.1

mozilla mozilla 1.6

mozilla mozilla 1.7.7

mozilla mozilla 1.7.8

mozilla firefox 0.10.1

mozilla firefox 0.8

mozilla firefox 1.0.2

mozilla firefox 1.0.3

mozilla mozilla 1.5.1

mozilla mozilla 1.5

mozilla mozilla 1.7.1

mozilla mozilla 1.7.2

mozilla mozilla 1.7

mozilla firefox 0.10

mozilla firefox 1.0

mozilla firefox 1.0.1

mozilla firefox 0.9.1

mozilla firefox 1.0.4

mozilla mozilla 1.3

mozilla mozilla 1.7.3

mozilla mozilla 1.7.5

mozilla mozilla 1.7.6

Vendor Advisories

Synopsis thunderbird security update Type/Severity Security Advisory: Important Topic Updated thunderbird package that fixes various bugs is now available forRed Hat Enterprise Linux 4This update has been rated as having important security impact by the RedHat Security Response Team Description ...
Synopsis mozilla security update Type/Severity Security Advisory: Important Topic Updated mozilla packages that fix various security issues are now availableThis update has been rated as having important security impact by the RedHat Security Response Team Description Mozilla is an open s ...
Synopsis firefox security update Type/Severity Security Advisory: Important Topic An updated firefox package that fixes various security bugs is nowavailable for Red Hat Enterprise Linux 4This update has been rated as having important security impact by the RedHat Security Response Team Descripti ...
Several problems have been discovered in Mozilla Thunderbird, the standalone mail client of the Mozilla suite The Common Vulnerabilities and Exposures project identifies the following problems: CAN-2005-0989 Remote attackers could read portions of heap memory into a Javascript string via the lambda replace method CAN-2005-1159 The Ja ...
Several problems have been discovered in Mozilla, the web browser of the Mozilla suite Since the usual praxis of backporting apparently does not work for this package, this update is basically version 1710 with the version number rolled back, and hence still named 178 The Common Vulnerabilities and Exposures project identifies the following p ...
Secuniacom reported that one of the recent security patches in Firefox reintroduced the frame injection patch that was originally known as CAN-2004-0718 This allowed a malicious web site to spoof the contents of other web sites (CAN-2005-1937) ...
USN-149-1 fixed some vulnerabilities in the Ubuntu 504 (Hoary Hedgehog) version of Firefox The version shipped with Ubuntu 410 (Warty Warthog) is also vulnerable to these flaws, so it needs to be upgraded as well Please see ...
Vladimir V Perepelitsa discovered a bug in Thunderbird’s handling of anonymous functions during regular expression string replacement A malicious HTML email could exploit this to capture a random block of client memory (CAN-2005-0989) ...
Secuniacom reported that one of the recent security patches in Firefox reintroduced the frame injection patch that was originally known as CAN-2004-0718 This allowed a malicious web site to spoof the contents of other web sites (CAN-2005-1937) ...

Exploits

## # $Id$ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote # # This ...
## # $Id: mozilla_comparetorb 10394 2010-09-20 08:06:27Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' cla ...