2.6
CVSSv2

CVE-2008-5503

Published: 17/12/2008 Updated: 03/10/2018
CVSS v2 Base Score: 2.6 | Impact Score: 2.9 | Exploitability Score: 4.9
VMScore: 231
Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N

Vulnerability Summary

The loadBindingDocument function in Mozilla Firefox 2.x prior to 2.0.0.19, Thunderbird 2.x prior to 2.0.0.19, and SeaMonkey 1.x prior to 1.1.14 does not perform any security checks related to the same-domain policy, which allows remote malicious users to read or access data from other domains via crafted XBL bindings.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox 2.0.0.15

mozilla firefox 2.0.0.14

mozilla firefox 2.0.0.7

mozilla firefox 2.0.0.6

mozilla firefox 2.0.0.5

mozilla thunderbird 2.0.0.12

mozilla thunderbird 2.0.0.9

mozilla seamonkey 1.0.2

mozilla seamonkey 1.0.3

mozilla seamonkey 1.1

mozilla seamonkey 1.1.1

mozilla seamonkey 1.1.8

mozilla seamonkey 1.1.9

mozilla thunderbird 2.0.0.16

mozilla thunderbird 2.0.0.17

mozilla firefox 2.0.0.11

mozilla firefox 2.0.0.10

mozilla firefox 2.0.0.2

mozilla firefox 2.0.0.1

mozilla thunderbird 2.0.0.4

mozilla thunderbird 2.0.0.0

mozilla seamonkey 1.0.7

mozilla seamonkey 1.0.8

mozilla seamonkey 1.1.4

mozilla seamonkey 1.1.5

mozilla seamonkey 1.1.12

mozilla firefox

mozilla firefox 2.0.0.13

mozilla firefox 2.0.0.12

mozilla firefox 2.0.0.4

mozilla firefox 2.0.0.3

mozilla thunderbird 2.0.0.6

mozilla thunderbird 2.0.0.5

mozilla seamonkey 1.0.5

mozilla seamonkey 1.0.6

mozilla seamonkey 1.1.2

mozilla seamonkey 1.1.3

mozilla seamonkey 1.1.10

mozilla seamonkey 1.1.11

mozilla firefox 2.0.0.16

mozilla firefox 2.0.0.17

mozilla firefox 2.0.0.9

mozilla firefox 2.0.0.8

mozilla firefox 2.0

mozilla thunderbird 2.0.0.14

mozilla seamonkey 1.0

mozilla seamonkey 1.0.1

mozilla seamonkey 1.0.9

mozilla seamonkey 1.1.6

mozilla seamonkey 1.1.7

mozilla thunderbird

mozilla seamonkey

Vendor Advisories

Synopsis Moderate: thunderbird security update Type/Severity Security Advisory: Moderate Topic Updated thunderbird packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 4 and 5This update has been rated as having moderate security impact by the RedHat Security Response Tea ...
Synopsis Critical: seamonkey security update Type/Severity Security Advisory: Critical Topic Updated seamonkey packages that fix security issues are now available forRed Hat Enterprise Linux 21, Red Hat Enterprise Linux 3, and Red HatEnterprise Linux 4This update has been rated as having critical security ...
Several flaws were discovered in the browser engine These problems could allow an attacker to crash the browser and possibly execute arbitrary code with user privileges (CVE-2008-5500) ...
Several flaws were discovered in the browser engine If a user had Javascript enabled, these problems could allow an attacker to crash Thunderbird and possibly execute arbitrary code with user privileges (CVE-2008-5500) ...
Several flaws were discovered in the browser engine If a user had Javascript enabled, these problems could allow an attacker to crash Thunderbird and possibly execute arbitrary code with user privileges (CVE-2008-5500) ...
Several flaws were discovered in the browser engine These problems could allow an attacker to crash the browser and possibly execute arbitrary code with user privileges (CVE-2008-5500) ...
Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-5500 Jesse Ruderman discovered that the layout engine is vulnerable to DoS attacks that might trigger memory corruption and an integer ov ...
Several remote vulnerabilities have been discovered in Iceape an unbranded version of the Seamonkey internet suite The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-0016 Justin Schuh, Tom Cross and Peter Williams discovered a buffer overflow in the parser for UTF-8 URLs, which may lead to the ex ...
Several remote vulnerabilities have been discovered in the Iceweasel web browser, an unbranded version of the Firefox browser The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-5500 Jesse Ruderman discovered that the layout engine is vulnerable to DoS attacks that might trigger memory corruption and ...
Mozilla Foundation Security Advisory 2008-61 Information stealing via loadBindingDocument Announced December 16, 2008 Reporter Boris Zbarsky Impact Moderate Products Firefox, SeaMonkey, Thunderbird Fixed in ...

References

NVD-CWE-Otherhttp://www.mozilla.org/security/announce/2008/mfsa2008-61.htmlhttps://bugzilla.mozilla.org/show_bug.cgi?id=379959http://secunia.com/advisories/33231http://secunia.com/advisories/33433http://www.debian.org/security/2009/dsa-1697http://www.redhat.com/support/errata/RHSA-2008-1037.htmlhttp://www.debian.org/security/2009/dsa-1707http://www.mandriva.com/security/advisories?name=MDVSA-2009:012http://www.debian.org/security/2009/dsa-1704http://secunia.com/advisories/33523http://secunia.com/advisories/33547http://secunia.com/advisories/33205http://www.ubuntu.com/usn/usn-690-2http://www.mandriva.com/security/advisories?name=MDVSA-2008:244http://secunia.com/advisories/33204http://secunia.com/advisories/33184http://secunia.com/advisories/33232http://www.securityfocus.com/bid/32882http://www.securitytracker.com/id?1021424http://secunia.com/advisories/33189http://www.redhat.com/support/errata/RHSA-2009-0002.htmlhttp://secunia.com/advisories/33421http://www.debian.org/security/2009/dsa-1696http://secunia.com/advisories/33434http://secunia.com/advisories/34501http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1http://www.vupen.com/english/advisories/2009/0977http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1http://secunia.com/advisories/35080http://www.ubuntu.com/usn/usn-701-2http://www.ubuntu.com/usn/usn-701-1http://secunia.com/advisories/33408http://secunia.com/advisories/33415https://exchange.xforce.ibmcloud.com/vulnerabilities/47409https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11423https://usn.ubuntu.com/690-3/https://access.redhat.com/errata/RHSA-2009:0002https://nvd.nist.govhttps://usn.ubuntu.com/690-3/