9.3
CVSSv2

CVE-2008-2785

Published: 19/06/2008 Updated: 11/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Mozilla Firefox prior to 2.0.0.16 and 3.x prior to 3.0.1, Thunderbird prior to 2.0.0.16, and SeaMonkey prior to 1.1.11 use an incorrect integer data type as a CSS object reference counter in the CSSValue array (aka nsCSSValue:Array) data structure, which allows remote malicious users to execute arbitrary code via a large number of references to a common CSS object, leading to a counter overflow and a free of in-use memory, aka ZDI-CAN-349.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox 2.0

mozilla firefox 2.0.0.1

mozilla firefox 2.0.0.5

mozilla firefox 2.0.0.6

mozilla thunderbird 2.0.0.9

mozilla thunderbird 2.0.0.6

mozilla thunderbird 1.5.0.10

mozilla thunderbird 1.5.0.9

mozilla thunderbird 1.0.7

mozilla thunderbird 1.0.6

mozilla thunderbird 0.6

mozilla thunderbird 0.5

mozilla seamonkey 1.0.9

mozilla seamonkey 1.0.8

mozilla seamonkey 1.0

mozilla seamonkey 1.1.8

mozilla seamonkey 1.1.7

mozilla firefox 2.0.0.3

mozilla firefox 2.0.0.4

mozilla firefox

mozilla thunderbird 2.0.0.12

mozilla thunderbird 1.5.0.13

mozilla thunderbird 1.5.0.12

mozilla thunderbird 1.5

mozilla thunderbird 1.0.8

mozilla thunderbird 0.8

mozilla thunderbird 0.7

mozilla seamonkey 1.1

mozilla seamonkey 1.0.2

mozilla seamonkey 1.0.1

mozilla seamonkey

mozilla seamonkey 1.1.9

mozilla seamonkey 1.1.2

mozilla seamonkey 1.1.1

mozilla firefox 2.0.0.10

mozilla firefox 2.0.0.11

mozilla firefox 2.0.0.7

mozilla firefox 2.0.0.8

mozilla thunderbird 2.0.0.5

mozilla thunderbird 2.0.0.4

mozilla thunderbird 1.5.0.8

mozilla thunderbird 1.5.0.7

mozilla thunderbird 1.0.5

mozilla thunderbird 1.0.2

mozilla thunderbird 0.4

mozilla thunderbird 0.3

mozilla seamonkey 1.0.7

mozilla seamonkey 1.0.6

mozilla seamonkey 1.0.5

mozilla thunderbird

mozilla seamonkey 1.1.6

mozilla seamonkey 1.1.5

mozilla firefox 2.0.0.12

mozilla firefox 2.0.0.13

mozilla firefox 2.0.0.2

mozilla firefox 2.0.0.9

mozilla firefox 3.0

mozilla thunderbird 2.0.0.0

mozilla thunderbird 1.5.0.14

mozilla thunderbird 1.5.0.5

mozilla thunderbird 1.5.0.4

mozilla thunderbird 1.5.0.2

mozilla thunderbird 1.0

mozilla thunderbird 0.9

mozilla thunderbird 0.2

mozilla thunderbird 0.1

mozilla seamonkey 1.0.4

mozilla seamonkey 1.0.3

mozilla firefox 2.0.0.14

mozilla seamonkey 1.1.4

mozilla seamonkey 1.1.3

Vendor Advisories

Debian Bug report logs - #488358 iceweasel: CVE-2008-2786 CVE-2008-2785: two vulnerabilities with unknown impact Package: iceweasel; Maintainer for iceweasel is Maintainers of Mozilla-related packages <team+pkg-mozilla@trackerdebianorg>; Source for iceweasel is src:firefox-esr (PTS, buildd, popcon) Reported by: Steffen Joe ...
USN-626-1 fixed vulnerabilities in xulrunner-19 The changes required that Devhelp, Epiphany, Midbrowser and Yelp also be updated to use the new xulrunner-19 ...
A flaw was discovered in the browser engine A variable could be made to overflow causing the browser to crash If a user were tricked into opening a malicious web page, an attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program (CVE-2008-2785) ...
Various flaws were discovered in the browser engine If a user had Javascript enabled and were tricked into opening a malicious web page, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program (CVE-2008-2798, CVE-2008-2799) ...
A flaw was discovered in the browser engine A variable could be made to overflow causing the browser to crash If a user were tricked into opening a malicious web page, an attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program (CVE-2008-2785) ...
Several remote vulnerabilities have been discovered in the Icedove mail client, an unbranded version of the Thunderbird client The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-0304 It was discovered that a buffer overflow in MIME decoding can lead to the execution of arbitrary code C ...
Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-2785 It was discovered that missing boundary checks on a reference counter for CSS objects can lead to the execution of arbitrary code CV ...
Several remote vulnerabilities have been discovered in Iceape an unbranded version of the Seamonkey internet suite The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-0016 Justin Schuh, Tom Cross and Peter Williams discovered a buffer overflow in the parser for UTF-8 URLs, which may lead to the ex ...
Several remote vulnerabilities have been discovered in the Iceweasel web browser, an unbranded version of the Firefox browser The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-2785 It was discovered that missing boundary checks on a reference counter for CSS objects can lead to the execution of a ...
Mozilla Foundation Security Advisory 2008-34 Remote code execution by overflowing CSS reference counter Announced July 15, 2008 Reporter TippingPoint Zero Day Initiative Impact Critical Products Firefox, SeaMonkey, Thunderbir ...

References

CWE-189http://dvlabs.tippingpoint.com/blog/2008/06/18/vulnerability-in-mozilla-firefox-30http://www.securityfocus.com/bid/29802http://secunia.com/advisories/30761http://secunia.com/advisories/31377http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0238http://www.slackware.org/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.380767https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00125.htmlhttp://www.ubuntu.com/usn/usn-629-1http://www.ubuntu.com/usn/usn-623-1http://www.redhat.com/support/errata/RHSA-2008-0599.htmlhttp://secunia.com/advisories/31306http://www.debian.org/security/2008/dsa-1615http://www.debian.org/security/2008/dsa-1621http://secunia.com/advisories/31129http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuilder-readme5031400https://bugzilla.mozilla.org/show_bug.cgi?id=440230https://issues.rpath.com/browse/RPL-2683http://secunia.com/advisories/31183http://secunia.com/advisories/31403https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00672.htmlhttp://www.mozilla.org/security/announce/2008/mfsa2008-34.htmlhttp://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.410484http://blog.mozilla.com/security/2008/06/18/new-security-issue-under-investigation/http://www.debian.org/security/2008/dsa-1614http://www.securitytracker.com/id?1020336http://www.mandriva.com/security/advisories?name=MDVSA-2008:148http://secunia.com/advisories/31253http://secunia.com/advisories/31122https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00144.htmlhttp://secunia.com/advisories/31157http://www.mandriva.com/security/advisories?name=MDVSA-2008:155http://www.slackware.org/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.380974http://secunia.com/advisories/31176http://www.redhat.com/support/errata/RHSA-2008-0598.htmlhttp://secunia.com/advisories/31286http://www.redhat.com/support/errata/RHSA-2008-0597.htmlhttp://secunia.com/advisories/31220http://secunia.com/advisories/31270http://www.zerodayinitiative.com/advisories/ZDI-08-044/http://secunia.com/advisories/31154http://secunia.com/advisories/31145http://www.ubuntu.com/usn/usn-626-2https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00667.htmlhttp://rhn.redhat.com/errata/RHSA-2008-0616.htmlhttp://secunia.com/advisories/31195http://security.gentoo.org/glsa/glsa-200808-03.xmlhttp://secunia.com/advisories/31261http://secunia.com/advisories/31121http://www.ubuntu.com/usn/usn-626-1http://secunia.com/advisories/31144http://secunia.com/advisories/33433http://www.debian.org/security/2009/dsa-1697http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1http://secunia.com/advisories/34501http://www.vupen.com/english/advisories/2009/0977http://www.vupen.com/english/advisories/2008/1873https://exchange.xforce.ibmcloud.com/vulnerabilities/43167https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9900http://www.securityfocus.com/archive/1/494860/100/0/threadedhttp://www.securityfocus.com/archive/1/494504/100/0/threadedhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488358https://nvd.nist.govhttps://usn.ubuntu.com/626-2/