4.3
CVSSv2

CVE-2007-2869

Published: 01/06/2007 Updated: 16/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

The form autocomplete feature in Mozilla Firefox 1.5.x prior to 1.5.0.12, 2.x prior to 2.0.0.4, and possibly earlier versions, allows remote malicious users to cause a denial of service (persistent temporary CPU consumption) via a large number of characters in a submitted form.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox 1.5

mozilla firefox 1.5.0.1

mozilla firefox 1.5.0.7

mozilla firefox 1.5.0.8

mozilla firefox 1.5.0.5

mozilla firefox 1.5.0.6

mozilla firefox 2.0.0.3

mozilla firefox 1.5.0.3

mozilla firefox 1.5.0.4

mozilla firefox 2.0.0.1

mozilla firefox 2.0.0.2

mozilla firefox 1.5.0.10

mozilla firefox 1.5.0.11

mozilla firefox 1.5.0.2

mozilla firefox 1.5.0.9

mozilla firefox 2.0

Vendor Advisories

Various flaws were discovered in the layout and JavaScript engines By tricking a user into opening a malicious web page, an attacker could execute arbitrary code with the user’s privileges (CVE-2007-2867, CVE-2007-2868) ...
Mozilla Foundation Security Advisory 2007-13 Persistent Autocomplete Denial of Service Announced May 30, 2007 Reporter Marcel Impact Low Products Firefox Fixed in Firefox 15012 ...

References

NVD-CWE-Otherhttp://www.mozilla.org/security/announce/2007/mfsa2007-13.htmlhttps://issues.rpath.com/browse/RPL-1424http://www.debian.org/security/2007/dsa-1306http://www.debian.org/security/2007/dsa-1308http://security.gentoo.org/glsa/glsa-200706-06.xmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:120http://www.mandriva.com/security/advisories?name=MDKSA-2007:126http://www.redhat.com/support/errata/RHSA-2007-0400.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0401.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0402.htmlhttp://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.571857http://www.novell.com/linux/security/advisories/2007_36_mozilla.htmlhttp://www.ubuntu.com/usn/usn-468-1http://www.us-cert.gov/cas/techalerts/TA07-151A.htmlhttp://www.securityfocus.com/bid/24242http://www.securitytracker.com/id?1018154http://secunia.com/advisories/25476http://secunia.com/advisories/25533http://secunia.com/advisories/25635http://secunia.com/advisories/25647http://secunia.com/advisories/25685http://secunia.com/advisories/25534http://secunia.com/advisories/25490http://secunia.com/advisories/25750http://secunia.com/advisories/25858http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742http://www.vupen.com/english/advisories/2007/1994http://osvdb.org/35135https://exchange.xforce.ibmcloud.com/vulnerabilities/34612https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11208http://www.securityfocus.com/archive/1/470172/100/200/threadedhttps://usn.ubuntu.com/468-1/https://nvd.nist.gov