CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
EPSS
Percentile
99.0%
A vulnerability in the Mozilla JavaScript engine may allow execution of arbitrary code or denial of service.
The Mozilla JavaScript engine contains an unspecified vulnerability that may result in memory corruption. The impact of this memory corruption is unclear. According to Mozilla Foundation Security Advisory 2007-12:
Some of these crashes that showed evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code.
Information about the individual bug reports addressed in this update can be found in Mozilla Foundation Security Advisory 2007-12.
Potential consequences include remote execution of arbitrary code and denial of service.
Upgrade
These vulnerabilities are addressed in Firefox 2.0.0.4, Firefox 1.5.0.12, Thunderbird 2.0.0.4, Thunderbird 1.5.0.12, SeaMonkey 1.0.9, SeaMonkey 1.1.2.
Users that are unable to update should consider the following workaround:
Disable JavaScript
For instructions on how to disable JavaScript in Firefox, please refer to the Firefox section of the Securing Your Web Browser document.
609956
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: May 31, 2007
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Refer to Mozilla Foundation Security Advisory 2007-12.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23609956 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
These vulnerabilities were reported in Mozilla Foundation Security Advisory 2007-12. Mozilla credits Brendan Eich, Igor Bukanov, Jesse Ruderman, moz_bug_r_a4 and Wladimir Palant with reporting these issues.
This document was written by Chris Taschner.
CVE IDs: | CVE-2007-2868 |
---|---|
Severity Metric: | 8.19 Date Public: |
secunia.com/advisories/25489/
www.mozilla.org/security/announce/2007/mfsa2007-12.html
bugzilla.mozilla.org/show_bug.cgi?id=351102
bugzilla.mozilla.org/show_bug.cgi?id=367121
bugzilla.mozilla.org/show_bug.cgi?id=367561
bugzilla.mozilla.org/show_bug.cgi?id=367630
bugzilla.mozilla.org/show_bug.cgi?id=369666
bugzilla.mozilla.org/show_bug.cgi?id=369714
bugzilla.mozilla.org/show_bug.cgi?id=370101
bugzilla.mozilla.org/show_bug.cgi?id=370488
bugzilla.mozilla.org/show_bug.cgi?id=375183
bugzilla.mozilla.org/show_bug.cgi?id=375711