9.3
CVSSv2

CVE-2009-1169

Published: 27/03/2009 Updated: 29/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

The txMozillaXSLTProcessor::TransformToDoc function in Mozilla Firefox prior to 3.0.8 and SeaMonkey prior to 1.1.16 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via an XML file with a crafted XSLT transform.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox 2.0.0.14

mozilla firefox 2.0.0.12

mozilla firefox 3.0.1

mozilla firefox 0.9

mozilla firefox 2.0

mozilla firefox 1.0.3

mozilla firefox 0.10.1

mozilla firefox 0.9.1

mozilla firefox 2.0.0.19

mozilla firefox 3.0

mozilla firefox 0.9.3

mozilla firefox 0.9.2

mozilla firefox 1.0.2

mozilla firefox 2.0_.1

mozilla firefox 2.0_.10

mozilla firefox 2.0.0.21

mozilla firefox 2.0.0.17

mozilla firefox 0.7

mozilla firefox 0.7.1

mozilla firefox 1.5.0.4

mozilla firefox 1.5.0.5

mozilla firefox 1.5.0.10

mozilla firefox 1.5.3

mozilla firefox 1.5.0.7

mozilla firefox 1.5

mozilla firefox 2.0.0.6

mozilla firefox 2.0.0.1

mozilla firefox 3.0.4

mozilla firefox 2.0.0.20

mozilla firefox 1.0

mozilla firefox 1.0.7

mozilla firefox 1.0.6

mozilla firefox 2.0.0.9

mozilla firefox 2.0_.6

mozilla firefox 2.0_.7

mozilla firefox 2.0.0.16

mozilla firefox 2.0.0.11

mozilla firefox 0.5

mozilla firefox 0.6

mozilla firefox 1.5.0.11

mozilla firefox 2.0.0.7

mozilla firefox 1.5.2

mozilla firefox 1.5.0.8

mozilla firefox 1.5.8

mozilla firefox 1.5.7

mozilla firefox 2.0.0.3

mozilla firefox 0.9_rc

mozilla firefox 2.0.0.8

mozilla firefox 3.0beta5

mozilla firefox 0.10

mozilla firefox 0.8

mozilla firefox 1.0.1

mozilla firefox 3.0.5

mozilla firefox 1.0.5

mozilla firefox 1.0.4

mozilla firefox 2.0_.4

mozilla firefox 2.0_.5

mozilla firefox 2.0.0.10

mozilla firefox 0.3

mozilla firefox 0.4

mozilla firefox 1.5.0.2

mozilla firefox 1.5.0.3

mozilla firefox 1.5.4

mozilla firefox 1.5.1

mozilla firefox 1.8

mozilla firefox 2.0.0.5

mozilla firefox 2.0.0.4

mozilla firefox 3.0.3

mozilla firefox 2.0.0.18

mozilla firefox

mozilla firefox 1.0.8

mozilla firefox 2.0_.9

mozilla firefox 2.0_8

mozilla firefox 2.0.0.15

mozilla firefox 0.6.1

mozilla firefox 0.1

mozilla firefox 0.2

mozilla firefox 1.5.0.12

mozilla firefox 1.5.0.1

mozilla firefox 1.5.0.9

mozilla firefox 1.5.0.6

mozilla firefox 1.5.6

mozilla firefox 1.5.5

mozilla firefox 2.0.0.2

mozilla firefox 3.0.2

mozilla firefox 2.0.0.13

mozilla firefox 3.0.6

Vendor Advisories

It was discovered that Firefox did not properly perform XUL garbage collection If a user were tricked into viewing a malicious website, a remote attacker could cause a denial of service or execute arbitrary code with the privileges of the user invoking the program This issue only affected Ubuntu 804 LTS and 810 (CVE-2009-1044) ...
Synopsis Critical: seamonkey security update Type/Severity Security Advisory: Critical Topic Updated seamonkey packages that fix two security issues are now availablefor Red Hat Enterprise Linux 21, 3, and 4This update has been rated as having critical security impact by the RedHat Security Response Team ...
Synopsis Critical: firefox security update Type/Severity Security Advisory: Critical Topic Updated firefox packages that fix two security issues are now available forRed Hat Enterprise Linux 4 and 5This update has been rated as having critical security impact by the RedHat Security Response Team ...
Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications, such as the Iceweasel web browser The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-1169 Security researcher Guido Landi discovered that a XSL stylesheet could be used to crash the browse ...
Mozilla Foundation Security Advisory 2009-12 XSL Transformation vulnerability Announced March 27, 2009 Reporter Guido Landi, Andre, Michael Rooney, Martin Impact Critical Products Firefox, SeaMonkey Fixed in ...

Exploits

// firefox XSL parsing remote memory corruption poc // k`sOSe - works both in windows and linux githubcom/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8285targz (2009-ffox-poctargz) # milw0rmcom [2009-03-25] ...

References

CWE-399http://blogs.zdnet.com/security/?p=3013https://bugzilla.mozilla.org/show_bug.cgi?id=485217https://bugzilla.mozilla.org/show_bug.cgi?id=485286http://www.mozilla.org/security/announce/2009/mfsa2009-12.htmlhttps://bugzilla.mozilla.org/show_bug.cgi?id=460090http://www.securityfocus.com/bid/34235http://www.securitytracker.com/id?1021939http://www.redhat.com/support/errata/RHSA-2009-0397.htmlhttp://www.redhat.com/support/errata/RHSA-2009-0398.htmlhttp://secunia.com/advisories/34471http://www.mandriva.com/security/advisories?name=MDVSA-2009:084http://support.avaya.com/elmodocs2/security/ASA-2009-113.htmhttps://www.redhat.com/archives/fedora-package-announce/2009-March/msg01077.htmlhttp://www.debian.org/security/2009/dsa-1756http://secunia.com/advisories/34550http://secunia.com/advisories/34549http://secunia.com/advisories/34527http://secunia.com/advisories/34505http://secunia.com/advisories/34510http://secunia.com/advisories/34486http://secunia.com/advisories/34521https://www.redhat.com/archives/fedora-package-announce/2009-March/msg01040.htmlhttp://secunia.com/advisories/34511https://www.redhat.com/archives/fedora-package-announce/2009-March/msg01023.htmlhttp://www.vupen.com/english/advisories/2009/0853http://secunia.com/advisories/34792http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00008.htmlhttp://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.htmlhttp://www.ubuntu.com/usn/usn-745-1https://exchange.xforce.ibmcloud.com/vulnerabilities/49439https://www.exploit-db.com/exploits/8285https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11372https://usn.ubuntu.com/745-1/https://nvd.nist.govhttps://www.exploit-db.com/exploits/8285/