9.3
CVSSv2

CVE-2007-0777

Published: 26/02/2007 Updated: 09/10/2019
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

The JavaScript engine in Mozilla Firefox prior to 1.5.0.10 and 2.x prior to 2.0.0.2, Thunderbird prior to 1.5.0.10, and SeaMonkey prior to 1.0.8 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla thunderbird

mozilla firefox

mozilla seamonkey

canonical ubuntu linux 5.10

canonical ubuntu linux 6.06

canonical ubuntu linux 6.10

Vendor Advisories

The SSLv2 protocol support in the NSS library did not sufficiently check the validity of public keys presented with a SSL certificate A malicious SSL web site using SSLv2 could potentially exploit this to execute arbitrary code with the user’s privileges (CVE-2007-0008) ...
Several flaws have been found that could be used to perform Cross-site scripting attacks A malicious web site could exploit these to modify the contents or steal confidential data (such as passwords) from other opened web pages (CVE-2006-6077, CVE-2007-0780, CVE-2007-0800, CVE-2007-0981, CVE-2007-0995, CVE-2007-0996) ...
USN-428-1 fixed vulnerabilities in Firefox 15 However, changes to library paths caused applications depending on libnss3 to fail to start up This update fixes the problem ...
Mozilla Foundation Security Advisory 2007-01 Crashes with evidence of memory corruption (rv:18010/1812) Announced February 23, 2007 Reporter Mozilla developers and community Impact Critical Products Firefox, SeaMonkey, ...

References

CWE-119http://www.mozilla.org/security/announce/2007/mfsa2007-01.htmlhttps://issues.rpath.com/browse/RPL-1081https://issues.rpath.com/browse/RPL-1103http://fedoranews.org/cms/node/2713http://fedoranews.org/cms/node/2728http://security.gentoo.org/glsa/glsa-200703-04.xmlhttp://www.gentoo.org/security/en/glsa/glsa-200703-08.xmlhttp://security.gentoo.org/glsa/glsa-200703-18.xmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:052http://www.redhat.com/support/errata/RHSA-2007-0079.htmlhttp://rhn.redhat.com/errata/RHSA-2007-0077.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0078.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0097.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0108.htmlhttp://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.htmlhttp://www.ubuntu.com/usn/usn-428-1http://www.ubuntu.com/usn/usn-431-1http://www.kb.cert.org/vuls/id/269484http://www.securityfocus.com/bid/22694http://www.securitytracker.com/id?1017698http://secunia.com/advisories/24238http://secunia.com/advisories/24252http://secunia.com/advisories/24287http://secunia.com/advisories/24290http://secunia.com/advisories/24205http://secunia.com/advisories/24328http://secunia.com/advisories/24333http://secunia.com/advisories/24343http://secunia.com/advisories/24320http://secunia.com/advisories/24293http://secunia.com/advisories/24393http://secunia.com/advisories/24395http://secunia.com/advisories/24384http://secunia.com/advisories/24389http://secunia.com/advisories/24410http://secunia.com/advisories/24437http://secunia.com/advisories/24522ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.aschttp://secunia.com/advisories/24650http://fedoranews.org/cms/node/2747http://fedoranews.org/cms/node/2749http://www.mandriva.com/security/advisories?name=MDKSA-2007:050ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.aschttp://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131http://www.novell.com/linux/security/advisories/2007_22_mozilla.htmlhttp://www.osvdb.org/32115http://secunia.com/advisories/24406http://secunia.com/advisories/24455http://secunia.com/advisories/24456http://secunia.com/advisories/24457http://secunia.com/advisories/24342http://www.vupen.com/english/advisories/2007/0718http://www.vupen.com/english/advisories/2007/0719http://www.vupen.com/english/advisories/2008/0083http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742https://exchange.xforce.ibmcloud.com/vulnerabilities/32699https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11331http://www.securityfocus.com/archive/1/461809/100/0/threadedhttp://www.securityfocus.com/archive/1/461336/100/0/threadedhttps://nvd.nist.govhttps://usn.ubuntu.com/431-1/https://www.kb.cert.org/vuls/id/269484