6.4
CVSSv2

CVE-2007-0779

Published: 26/02/2007 Updated: 16/10/2018
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

GUI overlay vulnerability in Mozilla Firefox 1.5.x prior to 1.5.0.10 and 2.x prior to 2.0.0.2, and SeaMonkey prior to 1.0.8 allows remote malicious users to spoof certain user interface elements, such as the host name or security indicators, via the CSS3 hotspot property with a large, transparent, custom cursor.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox 0.9.2

mozilla firefox 0.9.3

mozilla firefox 0.9_rc

mozilla firefox 1.0.6

mozilla firefox 1.0.7

mozilla firefox 1.5.0.5

mozilla firefox 1.5.0.6

mozilla firefox 2.0

mozilla firefox 2.0.0.1

mozilla seamonkey 1.0.3

mozilla seamonkey 1.0.4

mozilla seamonkey 1.0

mozilla firefox 0.8

mozilla firefox 0.9.1

mozilla firefox 1.0.4

mozilla firefox 1.0.5

mozilla firefox 1.5.0.3

mozilla firefox 1.5.0.4

mozilla firefox 1.5.8

mozilla firefox 1.5

mozilla seamonkey 1.0.1

mozilla seamonkey 1.0.2

mozilla firefox 0.10

mozilla firefox 0.10.1

mozilla firefox 1.0.2

mozilla firefox 1.0.3

mozilla firefox 1.5.0.1

mozilla firefox 1.5.0.2

mozilla firefox 1.5.0.9

mozilla firefox 1.5.6

mozilla seamonkey 1.0.7

mozilla seamonkey 1.0.99

mozilla firefox 1.0

mozilla firefox 1.0.1

mozilla firefox 1.0.8

mozilla firefox 1.5.0.7

mozilla firefox 1.5.0.8

mozilla seamonkey 1.0.5

mozilla seamonkey 1.0.6

Vendor Advisories

Several flaws have been found that could be used to perform Cross-site scripting attacks A malicious web site could exploit these to modify the contents or steal confidential data (such as passwords) from other opened web pages (CVE-2006-6077, CVE-2007-0780, CVE-2007-0800, CVE-2007-0981, CVE-2007-0995, CVE-2007-0996) ...
USN-428-1 fixed vulnerabilities in Firefox 15 However, changes to library paths caused applications depending on libnss3 to fail to start up This update fixes the problem ...
Mozilla Foundation Security Advisory 2007-04 Spoofing using custom cursor and CSS3 hotspot Announced February 23, 2007 Reporter David Eckel Impact Low Products Firefox, SeaMonkey Fixed in ...

References

NVD-CWE-Otherhttp://www.mozilla.org/security/announce/2007/mfsa2007-04.htmlhttps://bugzilla.mozilla.org/show_bug.cgi?id=361298https://issues.rpath.com/browse/RPL-1081https://issues.rpath.com/browse/RPL-1103http://fedoranews.org/cms/node/2713http://fedoranews.org/cms/node/2728http://security.gentoo.org/glsa/glsa-200703-04.xmlhttp://www.gentoo.org/security/en/glsa/glsa-200703-08.xmlhttp://www.redhat.com/support/errata/RHSA-2007-0079.htmlhttp://rhn.redhat.com/errata/RHSA-2007-0077.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0078.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0097.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0108.htmlhttp://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.htmlhttp://www.ubuntu.com/usn/usn-428-1http://www.securityfocus.com/bid/22694http://www.securitytracker.com/id?1017700http://secunia.com/advisories/24238http://secunia.com/advisories/24287http://secunia.com/advisories/24290http://secunia.com/advisories/24205http://secunia.com/advisories/24328http://secunia.com/advisories/24333http://secunia.com/advisories/24343http://secunia.com/advisories/24320http://secunia.com/advisories/24293http://secunia.com/advisories/24393http://secunia.com/advisories/24395http://secunia.com/advisories/24384http://secunia.com/advisories/24437ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.aschttp://secunia.com/advisories/24650http://www.mandriva.com/security/advisories?name=MDKSA-2007:050ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.aschttp://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131http://www.novell.com/linux/security/advisories/2007_22_mozilla.htmlhttp://secunia.com/advisories/24455http://secunia.com/advisories/24457http://secunia.com/advisories/24342http://osvdb.org/32109http://www.vupen.com/english/advisories/2008/0083http://www.vupen.com/english/advisories/2007/0718http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8757http://www.securityfocus.com/archive/1/461809/100/0/threadedhttp://www.securityfocus.com/archive/1/461336/100/0/threadedhttps://nvd.nist.govhttps://usn.ubuntu.com/428-1/