5
CVSSv2

CVE-2008-5510

Published: 17/12/2008 Updated: 08/11/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The CSS parser in Mozilla Firefox 3.x prior to 3.0.5 and 2.x prior to 2.0.0.19, Thunderbird 2.x prior to 2.0.0.19, and SeaMonkey 1.x prior to 1.1.14 ignores the '\0' escaped null character, which might allow remote malicious users to bypass protection mechanisms such as sanitization routines.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox

mozilla seamonkey

mozilla thunderbird

canonical ubuntu linux 8.10

canonical ubuntu linux 7.10

canonical ubuntu linux 8.04

debian debian linux 4.0

debian debian linux 5.0

Vendor Advisories

Synopsis Critical: firefox security update Type/Severity Security Advisory: Critical Topic An updated firefox package that fixes various security issues is nowavailable for Red Hat Enterprise Linux 4 and 5This update has been rated as having critical security impact by the RedHat Security Response Team ...
Several remote vulnerabilities have been discovered in the Iceweasel web browser, an unbranded version of the Firefox browser The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-5500 Jesse Ruderman discovered that the layout engine is vulnerable to DoS attacks that might trigger memory corruption and ...
Several flaws were discovered in the browser engine If a user had Javascript enabled, these problems could allow an attacker to crash Thunderbird and possibly execute arbitrary code with user privileges (CVE-2008-5500) ...
Several flaws were discovered in the browser engine These problems could allow an attacker to crash the browser and possibly execute arbitrary code with user privileges (CVE-2008-5500, CVE-2008-5501, CVE-2008-5502) ...
Several flaws were discovered in the browser engine These problems could allow an attacker to crash the browser and possibly execute arbitrary code with user privileges (CVE-2008-5500) ...
Kojima Hajime discovered that Firefox did not properly handle an escaped null character An attacker may be able to exploit this flaw to bypass script sanitization (CVE-2008-5510) ...
Mozilla Foundation Security Advisory 2008-67 Escaped null characters ignored by CSS parser Announced December 16, 2008 Reporter Kojima Hajime Impact Low Products Firefox, SeaMonkey, Thunderbird Fixed in ...