9.3
CVSSv2

CVE-2007-5959

Published: 26/11/2007 Updated: 15/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple unspecified vulnerabilities in Mozilla Firefox prior to 2.0.0.10 and SeaMonkey prior to 1.1.7 allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger memory corruption.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox 0.10.1

mozilla firefox 0.8

mozilla firefox 1.0.2

mozilla firefox 1.0.3

mozilla firefox 1.5.0.10

mozilla firefox 1.5.0.11

mozilla firefox 1.5.0.7

mozilla firefox 1.5.0.8

mozilla firefox 1.5.6

mozilla firefox 1.5.7

mozilla firefox 1.5.8

mozilla firefox 2.0.0.5

mozilla firefox 2.0.0.6

mozilla seamonkey 1.0

mozilla seamonkey 1.0.1

mozilla seamonkey 1.0.9

mozilla seamonkey 1.1

mozilla firefox 0.9.2

mozilla firefox 0.9.3

mozilla firefox 1.0.7

mozilla firefox 1.0.8

mozilla firefox 1.5.0.3

mozilla firefox 1.5.0.4

mozilla firefox 1.5.2

mozilla firefox 1.5.3

mozilla firefox 2.0.0.1

mozilla firefox 2.0.0.2

mozilla firefox 2.0.0.9

mozilla firefox 2.0

mozilla seamonkey 1.0.4

mozilla seamonkey 1.0.5

mozilla seamonkey 1.1.4

mozilla seamonkey 1.1.5

mozilla firefox 0.9

mozilla firefox 0.9.1

mozilla firefox 1.0.4

mozilla firefox 1.0.5

mozilla firefox 1.0.6

mozilla firefox 1.5.0.12

mozilla firefox 1.5.0.2

mozilla firefox 1.5.0.9

mozilla firefox 1.5.1

mozilla firefox 1.8

mozilla firefox 2.0.0.7

mozilla firefox 2.0.0.8

mozilla seamonkey 1.0.2

mozilla seamonkey 1.0.3

mozilla seamonkey 1.1.2

mozilla seamonkey 1.1.3

mozilla firefox 0.10

mozilla firefox 1.0

mozilla firefox 1.0.1

mozilla firefox 1.5

mozilla firefox 1.5.0.1

mozilla firefox 1.5.0.5

mozilla firefox 1.5.0.6

mozilla firefox 1.5.4

mozilla firefox 1.5.5

mozilla firefox 2.0.0.3

mozilla firefox 2.0.0.4

mozilla seamonkey 1.0.6

mozilla seamonkey 1.0.7

mozilla seamonkey 1.0.8

Vendor Advisories

USN-546-1 fixed vulnerabilities in Firefox The upstream update included a faulty patch which caused the drawImage method of the canvas element to fail This update fixes the problem ...
It was discovered that Firefox incorrectly associated redirected sites as the origin of “jar:” contents A malicious web site could exploit this to modify or steal confidential data (such as passwords) from other web sites (CVE-2007-5947) ...
Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-5947 Jesse Ruderman and Petko D Petkov discovered that the URI handler for JAR archives allows cross-site scripting CVE-2007-5959 Se ...
Several remote vulnerabilities have been discovered in the Iceweasel web browser, an unbranded version of the Firefox browser The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-5947 Jesse Ruderman and Petko D Petkov discovered that the URI handler for JAR archives allows cross-site scripting CVE ...
Mozilla Foundation Security Advisory 2007-38 Memory corruption vulnerabilities (rv:18110) Announced November 26, 2007 Impact High Products Firefox, SeaMonkey Fixed in Firefox 20010 ...

References

NVD-CWE-noinfohttp://www.mozilla.org/security/announce/2007/mfsa2007-38.htmlhttp://www.debian.org/security/2007/dsa-1424http://www.debian.org/security/2007/dsa-1425http://www.redhat.com/support/errata/RHSA-2007-1082.htmlhttp://www.redhat.com/support/errata/RHSA-2007-1084.htmlhttp://lists.opensuse.org/opensuse-security-announce/2007-12/msg00004.htmlhttp://www.ubuntu.com/usn/usn-546-2http://www.securityfocus.com/bid/26593http://securitytracker.com/id?1018994http://secunia.com/advisories/27725http://secunia.com/advisories/27793http://secunia.com/advisories/27796http://secunia.com/advisories/27797http://secunia.com/advisories/27816http://secunia.com/advisories/27944http://secunia.com/advisories/27957http://secunia.com/advisories/28001http://bugs.gentoo.org/show_bug.cgi?id=198965http://bugs.gentoo.org/show_bug.cgi?id=200909https://issues.rpath.com/browse/RPL-1984http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0260http://security.gentoo.org/glsa/glsa-200712-21.xmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:246http://www.redhat.com/support/errata/RHSA-2007-1083.htmlhttp://secunia.com/advisories/28016http://secunia.com/advisories/27955http://secunia.com/advisories/28171http://secunia.com/advisories/28277http://browser.netscape.com/releasenotes/http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374833http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.365006http://secunia.com/advisories/27800http://secunia.com/advisories/27838http://secunia.com/advisories/27845http://secunia.com/advisories/28398https://www.redhat.com/archives/fedora-package-announce/2007-November/msg01011.htmlhttps://www.redhat.com/archives/fedora-package-announce/2007-December/msg00168.htmlhttps://www.redhat.com/archives/fedora-package-announce/2007-December/msg00135.htmlhttps://www.redhat.com/archives/fedora-package-announce/2007-December/msg00115.htmlhttp://secunia.com/advisories/27855http://secunia.com/advisories/27979http://sunsolve.sun.com/search/document.do?assetkey=1-26-231441-1http://wiki.rpath.com/Advisories:rPSA-2008-0093http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093https://issues.rpath.com/browse/RPL-1995http://secunia.com/advisories/29164http://sunsolve.sun.com/search/document.do?assetkey=1-77-1018977.1-1http://www.vupen.com/english/advisories/2007/4002http://www.vupen.com/english/advisories/2008/0083http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742http://www.vupen.com/english/advisories/2007/4018http://www.vupen.com/english/advisories/2008/0643https://exchange.xforce.ibmcloud.com/vulnerabilities/38643https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11014https://usn.ubuntu.com/546-1/http://www.securityfocus.com/archive/1/488971/100/0/threadedhttp://www.securityfocus.com/archive/1/488002/100/0/threadedhttps://nvd.nist.govhttps://usn.ubuntu.com/546-2/